{"id":1068,"date":"2025-01-28T20:51:51","date_gmt":"2025-01-28T18:51:51","guid":{"rendered":"https:\/\/www.dremsoc.com\/?page_id=1068"},"modified":"2025-05-23T17:17:58","modified_gmt":"2025-05-23T14:17:58","slug":"our-system","status":"publish","type":"page","link":"https:\/\/www.dremsoc.com\/he\/our-system\/","title":{"rendered":"Our System"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1068\" class=\"elementor elementor-1068\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56e6545 e-flex e-con-boxed e-con e-parent\" data-id=\"56e6545\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500.2,94.7L0,0v100h1000V0L500.2,94.7z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e07975f e-con-full e-flex e-con e-child\" data-id=\"e07975f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5145a8 elementor-widget elementor-widget-heading\" data-id=\"f5145a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Our System<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a1822b a-right midP elementor-widget elementor-widget-text-editor\" data-id=\"4a1822b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organization monitoring service against cyber threats<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67566fb elementor-widget elementor-widget-spacer\" data-id=\"67566fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef3589c e-con-full e-flex e-con e-parent\" data-id=\"ef3589c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500.2,94.7L0,0v100h1000V0L500.2,94.7z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3c9811 elementor-widget elementor-widget-image-carousel\" data-id=\"c3c9811\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;7&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;autoplay_speed&quot;:0,&quot;speed&quot;:5000,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:40,&quot;sizes&quot;:[]},&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"rtl\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\" alt=\"WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.28.25_af5e5b74-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.28.25_af5e5b74-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.27.52_a4bbee45-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.27.52_a4bbee45-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.26.42_ed6677c5-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.26.42_ed6677c5-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-11-at-19.25.56_d7831a6d.png\" alt=\"WhatsApp Image 2024-09-11 at 19.25.56_d7831a6d\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-03_at_19.19.14_b79ae2b1-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-03_at_19.19.14_b79ae2b1-removebg-preview.png\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.29.20_49185322-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.29.20_49185322-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp_Image_2024-09-11_at_19.29.44_3c0c902a-removebg-preview.png\" alt=\"WhatsApp_Image_2024-09-11_at_19.29.44_3c0c902a-removebg-preview\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"Image Carousel\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/WhatsApp-Image-2025-01-02-at-19.21.35_5d55ab41.webp\" alt=\"WhatsApp Image 2025-01-02 at 19.21.35_5d55ab41\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b57a40 e-flex e-con-boxed e-con e-parent\" data-id=\"5b57a40\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79e4af3 e-con-full e-flex e-con e-child\" data-id=\"79e4af3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-100d4a6 elementor-widget elementor-widget-image\" data-id=\"100d4a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/Our-system-img.webp\" class=\"attachment-full size-full wp-image-1070\" alt=\"\" srcset=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/Our-system-img.webp 2000w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/Our-system-img-300x300.webp 300w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/Our-system-img-1024x1024.webp 1024w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/Our-system-img-150x150.webp 150w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/Our-system-img-768x768.webp 768w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/Our-system-img-1536x1536.webp 1536w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4957f84 e-con-full e-flex e-con e-child\" data-id=\"4957f84\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0bb2fea elementor-widget elementor-widget-heading\" data-id=\"0bb2fea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Cybersecurity Solutions Tailored to Your Needs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1296d4a elementor-widget-divider--view-line_icon elementor-widget-divider--element-align-right div-one elementor-view-default elementor-widget elementor-widget-divider\" data-id=\"1296d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3e22ed elementor-widget elementor-widget-html\" data-id=\"e3e22ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n\n p, h1,h2,h3, h4{\n    direction: ltr ;\n\n    \n}\n\nhtml[lang=\"iw\"] .a-right p, html[lang=\"iw\"] h1, html[lang=\"iw\"] h2, html[lang=\"iw\"] h3, html[lang=\"iw\"] h4 {\n   \/* Set text direction to RTL \n    -to-right *\/\n      direction: rtl !important ;\n    text-align: right !important;\n      \/*direction: rtl !important;*\/\n}\n.hebShow{\n    display: none;\n    \n}\n.hebShow p{\n      direction: rtl !important\n}\n\nhtml[lang=\"iw\"] .hebShow{\n    display: block !important;\n}\n\nhtml[lang=\"iw\"] .midP {\n   display: none;\n}\n\nhtml[lang=\"iw\"] .div-one .elementor-divider{\n    flex-direction: column-reverse;\n   \n}\n\nhtml[lang=\"iw\"] .div-one .elementor-divider-separator{\n     margin: 0 !important;\n}\n\nhtml[lang=\"iw\"] .mitta h2{\n    text-align: center !important;\n} \n\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d280945 a-right elementor-widget elementor-widget-text-editor\" data-id=\"d280945\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">The company Secterious (Eitan Freimovich and Rony Atias) and the company ShvoIT (Moshe Shvo) used their extensive experience as CISOs and penetration testers for a wide range of organizations to develop a managed and innovative SIEM SOC service. This service, designed specifically for small and medium-sized businesses, is based on strong open source technologies and is tailored to meet the unique security needs of each customer.<\/p><p style=\"text-align: center;\">Our team, which boasts over 20 years of experience in cyber security and digital investigations, is made up of leading experts trained in leading cyber security companies and the IDF&#8217;s elite cyber units. We operate according to a customized methodology, which provides a response not only to the immediate needs of your organization but also prepares him to proactively deal with future threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad5ecf2 elementor-mobile-align-center elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ad5ecf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.dremsoc.com\/he\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48d63fe e-flex e-con-boxed e-con e-parent\" data-id=\"48d63fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca89604 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"ca89604\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">MITRE ATT&amp;CK <br>A Tactical Approach to Cyber Defense<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27aa714 a-right midP elementor-widget elementor-widget-text-editor\" data-id=\"27aa714\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span dir=\"ltr\" role=\"presentation\">The <\/span><span dir=\"ltr\" role=\"presentation\">MITRE ATT&amp;CK<\/span> <span dir=\"ltr\" role=\"presentation\">Matrix is <\/span><span dir=\"ltr\" role=\"presentation\">a modular infrastructure that presents a wide set of <\/span><span dir=\"ltr\" role=\"presentation\">attacking techniques used to achieve pre<\/span><span dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span dir=\"ltr\" role=\"presentation\">defined objectives.<\/span> <br role=\"presentation\" \/><span dir=\"ltr\" role=\"presentation\"><br \/>The tactics are classified by objectives in a matrix, which shows the process of an <\/span><span dir=\"ltr\" role=\"presentation\">attack from the starting point to the final effect.<\/span><\/p><p style=\"text-align: center;\"><span dir=\"ltr\" role=\"presentation\">The extended version of <\/span><span dir=\"ltr\" role=\"presentation\">MITRE ATT&amp;CK<\/span> <span dir=\"ltr\" role=\"presentation\">for Enterprise addresses many <\/span><span dir=\"ltr\" role=\"presentation\">environments, including Windows, macOS, Linux, PRE, Azure AD, Office 365, <\/span><span dir=\"ltr\" role=\"presentation\">Google Workspace, SaaS, IaaS, Network, and Containers. The various tactics in <\/span><span dir=\"ltr\" role=\"presentation\">which the attacks listed in <\/span><span dir=\"ltr\" role=\"presentation\">MITRE ATT&amp;CK<\/span> <span dir=\"ltr\" role=\"presentation\">can be used can be<\/span> <span dir=\"ltr\" role=\"presentation\">spear phishing, <\/span><span dir=\"ltr\" role=\"presentation\">command and control, and credential dumping.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17af7da e-flex e-con-boxed e-con e-child\" data-id=\"17af7da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9e8dd6d e-con-full info-box e-flex e-con e-child\" data-id=\"9e8dd6d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d55f980 mitta elementor-widget elementor-widget-heading\" data-id=\"d55f980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Reconnaissance<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d984112 elementor-widget elementor-widget-text-editor\" data-id=\"d984112\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gathering information about the target for planning future operations<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e13f88d e-con-full info-box e-flex e-con e-child\" data-id=\"e13f88d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4fd708 mitta elementor-widget elementor-widget-heading\" data-id=\"d4fd708\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Resource Development<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f09e118 elementor-widget elementor-widget-text-editor\" data-id=\"f09e118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0Establishment of resources to support operations, which includes the establishment of a command and control infrastructure<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-927e255 e-con-full info-box e-flex e-con e-child\" data-id=\"927e255\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bc3608 mitta elementor-widget elementor-widget-heading\" data-id=\"4bc3608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span>Initial access<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc15424 elementor-widget elementor-widget-text-editor\" data-id=\"fc15424\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An attempt to enter the network, such as phishing<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1f581d e-flex e-con-boxed e-con e-parent\" data-id=\"c1f581d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-089dcdf e-con-full e-flex e-con e-child\" data-id=\"089dcdf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-051a387 elementor-widget elementor-widget-heading\" data-id=\"051a387\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the DREM SOC solution<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-820a6b1 elementor-widget-divider--view-line_icon elementor-widget-divider--element-align-right div-one elementor-view-default elementor-widget elementor-widget-divider\" data-id=\"820a6b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c63ab8f a-right elementor-widget elementor-widget-text-editor\" data-id=\"c63ab8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An advanced and unified enterprise SIEM monitoring platform provides a comprehensive solution for persistent cyber threats and end-to-end hardening of enterprise systems.<\/p><p>The system is suitable for local, cloud and hybrid environments and guarantees comprehensive protection in the field of information security.<\/p><p>Especially in light of the transition to a routine of war, these areas are being re-invigorated due to the new challenges that include new attacks, vulnerabilities and weaknesses that are published daily.<\/p><p>This is a critical component that allows the organization to continue to function in a continuous business manner, when the SIEM platform supports a SOC system that operates 24\/7 by the talented analysts working in a FLAT TIER configuration (also know how to identify and operate) even in emergency situations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1d8914 e-con-full e-flex e-con e-child\" data-id=\"c1d8914\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34fbcc6 elementor-widget elementor-widget-image\" data-id=\"34fbcc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1368\" height=\"2000\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/our-system-img2.webp\" class=\"attachment-full size-full wp-image-1074\" alt=\"\" srcset=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/our-system-img2.webp 1368w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/our-system-img2-205x300.webp 205w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/our-system-img2-700x1024.webp 700w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/our-system-img2-768x1123.webp 768w, https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/01\/our-system-img2-1051x1536.webp 1051w\" sizes=\"(max-width: 1368px) 100vw, 1368px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dbac63a e-flex e-con-boxed e-con e-parent\" data-id=\"dbac63a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ab88645 e-con-full e-flex e-con e-child\" data-id=\"ab88645\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-249eaea elementor-widget__width-initial logo elementor-widget elementor-widget-image\" data-id=\"249eaea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2025\/05\/socrates_logo_png.png\" title=\"socrates_logo_png\" alt=\"socrates_logo_png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8bc9e elementor-widget elementor-widget-html\" data-id=\"4a8bc9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"gtranslate_wrapper\"><\/div>\r\n<script>window.gtranslateSettings = {\"default_language\":\"en\",\"languages\":[\"en\",\"iw\",\"es\"],\"wrapper_selector\":\".gtranslate_wrapper\",\"flag_style\":\"3d\"}<\/script>\r\n<script src=\"https:\/\/cdn.gtranslate.net\/widgets\/latest\/float.js\" defer><\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cb6160 elementor-widget elementor-widget-heading\" data-id=\"8cb6160\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\u00a9 Copyright 2024, Socrates cyber. All rights reserved<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Our System Organization monitoring service against cyber threats Advanced Cybersecurity Solutions Tailored to Your Needs The company Secterious (Eitan Freimovich and Rony Atias) and the company ShvoIT (Moshe Shvo) used their extensive experience as CISOs and penetration testers for a wide range of organizations to develop a managed and innovative SIEM SOC service. This service, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"footnotes":""},"class_list":["post-1068","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Our System - Socrates-Cyber.co<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.socrates-cyber.co\/our-system\/\" \/>\n<meta property=\"og:locale\" content=\"he_IL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our System - Socrates-Cyber.co\" \/>\n<meta property=\"og:description\" content=\"Our System Organization monitoring service against cyber threats Advanced Cybersecurity Solutions Tailored to Your Needs The company Secterious (Eitan Freimovich and Rony Atias) and the company ShvoIT (Moshe Shvo) used their extensive experience as CISOs and penetration testers for a wide range of organizations to develop a managed and innovative SIEM SOC service. This service, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.socrates-cyber.co\/our-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Socrates-Cyber.co\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T14:17:58+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 \u05d3\u05e7\u05d5\u05ea\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.socrates-cyber.co\/our-system\/\",\"url\":\"https:\/\/www.socrates-cyber.co\/our-system\/\",\"name\":\"Our System - Socrates-Cyber.co\",\"isPartOf\":{\"@id\":\"https:\/\/3.76.219.35\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.socrates-cyber.co\/our-system\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.socrates-cyber.co\/our-system\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\",\"datePublished\":\"2025-01-28T18:51:51+00:00\",\"dateModified\":\"2025-05-23T14:17:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.socrates-cyber.co\/our-system\/#breadcrumb\"},\"inLanguage\":\"he-IL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.socrates-cyber.co\/our-system\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/www.socrates-cyber.co\/our-system\/#primaryimage\",\"url\":\"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\",\"contentUrl\":\"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.socrates-cyber.co\/our-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.socrates-cyber.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/3.76.219.35\/#website\",\"url\":\"https:\/\/3.76.219.35\/\",\"name\":\"DREM SOC\",\"description\":\"Managed SIEM\/ SOC\",\"publisher\":{\"@id\":\"https:\/\/3.76.219.35\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/3.76.219.35\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"he-IL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/3.76.219.35\/#organization\",\"name\":\"DREM SOC\",\"url\":\"https:\/\/3.76.219.35\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png\",\"contentUrl\":\"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png\",\"width\":511,\"height\":488,\"caption\":\"DREM SOC\"},\"image\":{\"@id\":\"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Our System - Socrates-Cyber.co","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.socrates-cyber.co\/our-system\/","og_locale":"he_IL","og_type":"article","og_title":"Our System - Socrates-Cyber.co","og_description":"Our System Organization monitoring service against cyber threats Advanced Cybersecurity Solutions Tailored to Your Needs The company Secterious (Eitan Freimovich and Rony Atias) and the company ShvoIT (Moshe Shvo) used their extensive experience as CISOs and penetration testers for a wide range of organizations to develop a managed and innovative SIEM SOC service. This service, [&hellip;]","og_url":"https:\/\/www.socrates-cyber.co\/our-system\/","og_site_name":"Socrates-Cyber.co","article_modified_time":"2025-05-23T14:17:58+00:00","og_image":[{"url":"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da":"6 \u05d3\u05e7\u05d5\u05ea"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.socrates-cyber.co\/our-system\/","url":"https:\/\/www.socrates-cyber.co\/our-system\/","name":"Our System - Socrates-Cyber.co","isPartOf":{"@id":"https:\/\/3.76.219.35\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.socrates-cyber.co\/our-system\/#primaryimage"},"image":{"@id":"https:\/\/www.socrates-cyber.co\/our-system\/#primaryimage"},"thumbnailUrl":"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png","datePublished":"2025-01-28T18:51:51+00:00","dateModified":"2025-05-23T14:17:58+00:00","breadcrumb":{"@id":"https:\/\/www.socrates-cyber.co\/our-system\/#breadcrumb"},"inLanguage":"he-IL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.socrates-cyber.co\/our-system\/"]}]},{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/www.socrates-cyber.co\/our-system\/#primaryimage","url":"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png","contentUrl":"http:\/\/www.dremsoc.com\/wp-content\/uploads\/2024\/09\/WhatsApp-Image-2024-09-03-at-19.19.22_8fb039a0-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.socrates-cyber.co\/our-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.socrates-cyber.co\/"},{"@type":"ListItem","position":2,"name":"Our System"}]},{"@type":"WebSite","@id":"https:\/\/3.76.219.35\/#website","url":"https:\/\/3.76.219.35\/","name":"DREM SOC","description":"Managed SIEM\/ SOC","publisher":{"@id":"https:\/\/3.76.219.35\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3.76.219.35\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"he-IL"},{"@type":"Organization","@id":"https:\/\/3.76.219.35\/#organization","name":"DREM SOC","url":"https:\/\/3.76.219.35\/","logo":{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/","url":"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png","contentUrl":"https:\/\/www.dremsoc.com\/wp-content\/uploads\/2023\/11\/Logo-Transparent.png","width":511,"height":488,"caption":"DREM SOC"},"image":{"@id":"https:\/\/3.76.219.35\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages\/1068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/comments?post=1068"}],"version-history":[{"count":70,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages\/1068\/revisions"}],"predecessor-version":[{"id":1581,"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/pages\/1068\/revisions\/1581"}],"wp:attachment":[{"href":"https:\/\/www.dremsoc.com\/he\/wp-json\/wp\/v2\/media?parent=1068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}