Use STAP to manage your security operation center processes.
It is developed to manage your security operation center processes. With the Correlation Engine available in STAP you can create correlation in any complex structure you require and distribute them to the agents collectively. Thanks to the agent-based architecture of STAP you can keep the central management server in a separate location
and connect any location you require in a decentralized structure. You can integrate any log source in STAP. Our expert R&D team codes filters pertaining to your respective log source and integrates them to the software. Correlation works specific to your sources can also be performed. Properties of the product are specified in detail.
Live Attack Monitoring
Integration with other SIEM products in STAP allows central logs management.
Integration with other 5651 log signing products in STAP allows centrally signing and viewing logs.
With the IDS system available in STAP agents, the network traffic can be instantly analyzed with the mirror to be taken from backbone switch and side switches and attack detection can be performed and reported to the Central Management Server.
Ready integration is available in STAP together with 20+ products. Thus, you can gather the logs from the log source you require with a single click without requiring any additional effort.
With the advanced correlation engine developed by BEAM Teknoloji A.Ş. in STAP, you can put the logs taken from any log source in logical and temporal correlations in the manner you prefer.
With the report engine it is possible to retrieve HIPAA, PCI-DSS etc. report templates via STAP automatically, and it is also possible to create report in the desired manner.
Shift Report System
With the shift report screen created in the system for preventing data losses at the time of shift takeovers in SOC processes, a shift report is entered by the user whose shift is over and a report which allows analysis in the following shifts and in a retrospective manner.
Live Attack Monitoring
With the Live Attack Map screen it is possible to display the attacks live on the map with the data retrieved instantly from IDS' on the agent.
You can perform query and carry out researches manually with the threat intelligence source available in STAP. Data retrieved from the respective source can be automatically created as IDS or Correlation rule.
It is possible to block the traffic by entering rule to the firewall of the respective company of alert as a result of the alerts created through Firewall integration available in STAP. Blocked IP addresses can be tracked and false-positive cases can be repaired remotely.
It is possible to provide information automatically to the ``Company Official`` by creating ticket as a result of the alerts created through Ticket system available in STAP. Processes of the tickets can be tracked.
If a case is detected in the result of the created correlations it is possible to audibly and visually notify alarms created on the screen with mail and ticket over STAP Central Management Application.
Multiple user and Company Management
It is possible to ensure management, configuration and monitoring of all companies (agents) connected to the system via STAP Central Management Application. Logos of all companies (agents) are displayed on the main screen and their Up-Down statuses are represented graphically. It is possible to perform action on company basis upon entering the companies. It is possible to modify the configurations of all components on the remove server centrally using the panel.
Roles of the users are arranged according to SOC structures and any number of users can be created and authorized accordingly.
All components in STAP can function in a decentralized manner. They can be scaled horizontally and vertically. Thus, even infrastructures with very high EPS value can function.
Click on the link below for your cyber security requests.
Tercihlerinizi ve tekrar ziyaretlerinizi hatırlayarak size en alakalı deneyimi sunmak için web sitemizde çerezleri kullanıyoruz. "Kabul Et" i tıklayarak TÜM çerezlerin kullanılmasına izin vermiş olursunuz.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.