terminal

Safety monitoring of funds and information systems (SOC)

Round -the -clock control of the security of key information resources of the organization in our certified monitoring center

Each step is planned

01 connection

02 correlation

03 processing

04 reaction

05 regular reports

01 connection

We connect your infrastructure to a round -the -clock monitoring system.

02 correlation

We analyze network traffic and security events - we monitor not individual logs, but the connections between them: attempts to access, leakage, anomalies. We set up automatic notifications and response scenarios - to identify incidents at an early stage.

03 processing

We process incidents in real time (tracking, investigation, localization).

04 reaction

We respond to incidents - quickly, according to the script and taking into account architecture. We quickly eliminate the risks before they become a problem.

05 regular reports

We provide regular reports and recommendations for strengthening protection.

Madrigal in numbers and facts

Licenses

FSTEK and FSB of Russia

Social SOC

In the 25/8 mode

AI-laboratory

For the tasks of your business

Web server

Own development with built -in protection modules: Antiddos, WAF, NGFW
number-boxtable
glass
glass
\glass
glass
People
Years
customers from the TOP-100 RU companies
data centers is in the office
table

Its own II laboratory and data center

AI-laboratory

  • We build AI solutions for internal and client projects - models, consultants, assistants, decision support systems.
  • We launch projects, experiment, finalize. Everything is under control, on their infrastructure.
  • We highlight the power for research, experiments and our own development.

Data center

  • Safe connection schemes, isolated segments for backups.
  • Certified fault -tolerant hypervisor.
  • All infrastructure - under monitoring: from servers to climate sensors.
  • No compromises on accessibility and protection.