Protergo
Security Operation Center
The Security Operation Center is a team of cyber-security professionals constantly monitoring your network to identify and block attacks.
Protergo Security Operation Center is located in Rempoa and fully resourced.
We are the only platinum partner of AlienVault in Indonesia. AlienVault is the leading Security Operation Center software provider and is trusted by over 5,000+ clients across the world, including NASDAQ, Mastercard, U.S. Airforce, Bank of Ireland, New York Times and many others.

Step I
Install an applicance into your network connected to your core switch to monitor your NETWORK traffic
How does the Protergo Security Operation Center works?

Step II
Install an agent into your servers to monitoring your SOFTWARE security

Step III
A professional cyber-security team will monitor your infrastructure 24/7 and alerts you in case of any issues
Feature
We integrate 5 different functionalities in one simple solution that it's easy to be deployed and managed:
-
Asset Discovery
Know who and what is connected to your environment at all times. Have a real time asset inventory of all your hosts.
-
Vulnerability Assessment
Automatically assess and find your vulnerabilities before an exploit or intrusion. Our team works together with you to patch the most important issues.
-
Intrusion Detection
Be alerted to suspicious activities with host and network intrusion detection system and cloud intrusion detection system.
-
SIEM & Log Management
Correlate and analyze event data from across your environment. Manage logs seamlessly.
-
OTX (Open Threat Exchange )
The world's largest open threat intelligence community that enables collaborative defense with actionable, community-powered threat data.
Benefits


Reduce costs
Protecting your company with Protergo is more convinient rather than building your own Security Operation Center


Speed
Building a professional Security Operation Center can take several years. We bring you to market in 1 week.


Improve security
Through the Security Operation Center you can constantly monitor what is inside your network and constantly evolve


Protect from any Threats
Protect from external threats (e.g. DDOS, SQL injections, website attacks, ransomware, virus, warms) and Internal threats (e.g. bruteforcing, illegal access to resources, scanning attempts, unauthorized access to corporate data, download of large amount of data)
Packages
Basic
- Top features :
- Asset Discovery Platform
- Log Management System
- Security Incidents & Event Management (SIEM)
- Vulnerability Assessment
- Security Support
- Working hours incident response
Standard
- Top features :
- Asset Discovery Platform
- Log Management System
- Security Incidents & Event Management (SIEM)
- Vulnerability Assessment
- Security Support
- 24 x 7Â Security Monitoring & Incidents Response
Enterprise
- Top features :
- Asset Discovery Platform
- Log Management System
- Security Incidents & Event Management (SIEM)
- Vulnerability Assessment
- Security Support
- 24 x 7Â Security Monitoring & Incidents Response
Testimonials





David D. Daitez
Manufacturing




Lisa Kenney
Finance


Title
Finance




David D. Daitez
Manufacturing




Lisa Kenney
Finance




David D. Daitez
Manufacturing




Lisa Kenney
Finance


Title
Finance




David D. Daitez
Manufacturing



