GCP
Information Security
Data science & Analytics
Machine Learning
Quality assurance
Enterprise
Cloud

Managed Detect & Respond services - SIEM, SOAR and SoC

If a tree falls in the forest and nobody is around to hear it, does it even make a sound?

If your application container crashed at 3am, but the pod was automatically restarted and nobody saw, did the crash even happen in the first place?

Your site reliability team would certainly say so, and they would like to know about it so that they can resolve the issue. Your adversaries would like to know too, in case they can exploit the problem.

With the 2099 Group blueprint we can get your SoC team up and running on Google Chronicle in no time at all. If you don’t have a SoC team and want to opt for a managed service, we can work with a variety of partners and SIEM engines. Our main partner offers services running on Google SecOps (Chronicle) and can offer 24x7 vigilance based out of their systems operations center in Leeds, UK.

We will work together with your development team, your SoC team (or SoC provider) and SRE teams to help deliver any custom log ingestion or detection rules that you would like, to give your team assurances that in your environment no trees will fall unheard.

Client
Duration
Team Size
Completed

The Challenge

So many logs, so little time
Most successful cyber attacks begin with a series of vulnerability probes and scans.
If such activity is not detected early and then halted, there is nearly a 100% likelihood that a successful attack will be the end result.
IBM reported that in 2016 it took an average of 191 days for such attack staging activity to be detected.

Most tech companies will start with human monitoring. If something goes wrong then call an engineer out, get them to fish around in the logs for something relevant.

This will work up to a point but there are a lot of flaws in this strategy. For starters, most humans will fail to spot patterns in log files larger than a few hundred lines. After that, it all starts to look like white noise.

More serious than that, human log review is normally reactive and not pro-active. You will only find the problem if you already know that one exists. And if a problem occurred that you weren’t looking for? Like an unauthorised threat actor gaining access to your systems?

Well, if you weren’t looking at the logs you’ll never know...

Our Blueprint

Launched in 2023 as Chronicle, Google SecOps has quickly risen to become one of the top tools for security & incident event monitoring (SIEM) in the security and SRE space. Rather than leaving event schema up to the end users, it has a fixed event schema (known as UDM), and ingest pipelines pre-defined for most common log sources. Chronicle is great at correlating events from different log sources together, allowing you to build up a picture of what has happened in any given incident.

The search engine allows you to query through terabytes of log data instantly without having to do any sort of index management, using a very simple SQL-like search syntax. Chronicle comes with hundreds of detection rules built-in for picking up commonly encountered security issues and attack threat vectors such as repeated failed logins on various systems, port probing, superman attacks and more. The template rules allow you to get up and running without spending months writing rules for common attack scenarios. You can also write your own detection rules with the YARA-L language, and make custom dashboards for security and reliability monitoring.

Deploying a SIEM database can seem like a daunting task, but we have experts available and connections in the industry to help you succeed. Let us design your SIEM & SoC for success.

programming chat

Custom Development

social

Expert Consulting

ranking icon

Project Delivery

Our Process
01
Discovery & Analysis
Conducted comprehensive business analysis, customer research, and technical requirements gathering over 2 weeks.
User interviews
Competitor analysis
Technical audit
02
Design & Prototyping
Created wireframes, user flows, and interactive prototypes to validate the user experience before development.
UI/UX design
Prototype testing
Design system
03
Development & Integration
Built the mobile application using React Native with backend API integration and third-party service connections.
Frontend
Backend
API development
04
Testing & Launch
Comprehensive testing including unit tests, integration tests, and user acceptance testing before App Store deployment.
Quality assurance
Testing
App store

Results & Impact

%
Sales
Increase
+
App
Downloads
star
App Store
Rating
%
Mobile
Traffic

Tech Stack

Google SecOps (Chronicle)
Google Cloud Platform
End quote markBegin quote mark

Latest Solutions

Cybersecurity Checkup & Hardening

There is little point bolting the door after the thief has gone.
Client
Duration

Managed Detect & Respond services - SIEM, SOAR and SoC

If a tree falls in the forest and nobody is around to hear it, does it even make a sound?
Client
Duration

Private LLM Deployment

Do you trust OpenAI with your confidential information?
Client
Duration

Ready to Start Your Project?

Let's discuss how we can help solve your technical challenges and deliver innovative solutions for your business.