CANCOM Cyber Defense Center (CDC)โ€ฏ

Your partner for cyber security and managed security services

Cyber threats are constantly evolving โ€“ and so must your security. The CANCOM Cyber Defense Center offers state-of-the-art security solutions for companies of all sizes and in all industries. Backed by more than 10 years of expertise, innovative technologies, and a team of skilled experts, we ensure the best possible protection for your IT infrastructure.ย 
ย 
CANCOM Cyber Defense Services are therefore particularly aimed at customers who are unable to set up 24/7 attack monitoring and defense, or who do not want to do so due to the high internal costs involved.โ€ฏย ย 

b_cancom_cdc

Protect your business with the CANCOM Cyber Defense Centerโ€ฏโ€ฏย 

CANCOM Cyber Defense Services comprise a wide range of services and modules. The services are offered from the CANCOM CDC, where experts monitor companies’ IT environments around the clock, 365 days a year. As soon as a security incident is detected, a threat analysis is carried out immediately and countermeasures are initiated. To be prepared for the future, potential vulnerabilities are identified and closed.โ€ฏ  

After an initial planning and setup phase, all service modules are provided by CANCOM as a monthly service. CANCOM security analysts work hand in hand with our customers’ IT departments.โ€ฏ

Why should you use the CANCOM Cyber Defense Center?ย ย  ย 

Your added value at a glanceย โ€ฏย 

  • Round-the-clock monitoring by experienced analysts (200+ people in the CANCOM CDC team)ย ย 

  • Real-time detection of threats and anomalies (operations from the DACH region at locations such as Hamburg, Vienna, Klagenfurt, St. Gallen)ย 

  • Modular structure for flexible adaptation to your IT security requirementsย ย 

  • Use of state-of-the-art technologies such as market-leading SIEM, SOAR, and XDR platforms and threat intelligenceย 

  • Efficient incident response to quickly resolve security incidents (130+ customers in the DACH region)ย 

  • Customized solutions: Tailored security strategies for your companyย 

  • Compliance and regulations: Support for NIS2, IT-SIG 3.0, KRITIS, DORA, and moreย 

  • Greater transparency and control over your entire IT infrastructureย 

The CANCOM Cyber Defense Center provides you with a reliable, state-of-the-art security solution for your company. With 24/7 monitoring and comprehensive protection, our experts ensure that threats and cyberattacks are detected and repelled at an early stage.ย ย 

How we make a difference

Modular design CANCOM Cyber Defense Center

  1. Analysis and planning: Joint identification of security risks and requirements.โ€ฏย 
  2. Onboarding and integration: Implementation of services in the customer’s own IT environment.โ€ฏ
  3. Permanent monitoring: 24/7 detection, analysis, and defense against threats.โ€ฏ
  4. Incident response & recovery: Rapid defense response to attacks and measures for possible recovery.โ€ฏย โ€ฏย 
Hotspot CANCOM CDC

Threat Detection and Response (TDR)โ€ฏ

This is based on comprehensive real-time monitoring and analysis of various IT and OT systems and networks. In addition, threats and risks are identified and measures are taken to contain and ward off cyber threats.ย ย ย 

  • Log-based threat detection and response: Real-time analysis of log data to identify security threats.โ€ฏย โ€ฏย 
  • Incident Mitigation Service (IMS)ย 
  • Network Security Monitoring: Protection of networks through anomaly detection and advanced threat intelligence.โ€ฏย ย 
  • Operational Technology (OT) Monitoring: Security for industrial control systems and critical infrastructures.ย ย 

Threat Intelligence and Research (TI)โ€ฏย 

Vulnerabilities in the IT environment and cyber threats in the darknet and supply chain are continuously monitored and reported. This identifies potential risks to companies such as data leakage, extortion, data breaches, or damage to reputation.ย ย ย ย ย 

  • Vulnerability Management: Regular vulnerability analyses and risk assessments.ย 
  • Brand and Credential Monitoring: Identification of leaks and brand protection on the darknet and the internet.โ€ฏย 

This innovative endpoint protection is based on specific and continuous monitoring of endpoint behavior (clients/servers) using EDR. Suspicious activities are detected and dedicated measures are taken.ย ย ย 

  • Endpoint Protection: Protection for all endpoints through modern AI-based security solutions.โ€ฏ
  • Detection & Response for EDR/XDR: Round-the-clock monitoring and response to threats with market-leading technologies.โ€ฏย 
cdc schild

Red Team consists of ethical hackers who simulate realistic cyber attacks to comprehensively test a company’s security measures. Develops new possibilities and attack vectors to circumvent security measures in companies and tests them in a protected environment.ย 
  • Simulates real attacks on systems and processesย 

  • Goal: To uncover vulnerabilities

  • Works offensively and covertlyย 

  • Focus on deception, circumvention of security mechanismsย 

  • Tests whether defensive measures are workingย 

Purple Team Indicators of Compromise (IOCs) were specifically developed to detect security incidents at an early stage. In addition, active defense training strengthened the ability to respond to attacks. Existing processes were reviewed and optimized.
  • Connects Red and Blue Teams โ€“ cooperation instead of confrontation

  • Goal: Optimization of the security strategy through cooperationย ย 

  • Works in a mediating and integrating mannerย 

  • Focus on joint learning and improvement on both sidesย 

  • Analyzes how attacks can be better detected and defended againstย ย 

Blue Team detects an attack or penetration test/red reaming and passes on the tactics used to the Red Team for further processing. The insights gained are used to continuously improve security measures and prevent future attacks more effectively.
  • Actively defends systems against attacks

  • Goal: Detect and defend against attacksย 

  • Works defensively and transparentlyย 

  • Focuses on monitoring, analysis, and incident responseย 

  • Monitors systems and responds to attacks

CANCOM CDC: Security at the highest levelย โ€ฏ

The CANCOM Cyber Defense Center is based on internationally recognized security standards and best practices. Our methodology includes the MITRE ATT&CKยฎ framework, the Cyber Kill Chain, and proven ITIL and ISO 27001 standards. Thanks to our high true positive rate of 89 percent and the support of over 130 customers in the DACH region, we are one of the leading cyber defense providers.โ€ฏ

With our comprehensive range of services, technological expertise, and experienced team of analysts, we are setting new standards in cybersecurity. Let’s take your IT security to the next level together!โ€ฏ

Ready for your cybersecurity strategy?โ€ฏ Contact our team of experts!ย โ€ฏย 

Secure your IT infrastructure now with CANCOM Cyber Defense Center (CDC)!ย 

200+

Security specialists

650+

Certifications

10+

Standardized as-a-service variants

30+

Standardized service packagesย