{"id":1032,"date":"2025-11-24T10:00:56","date_gmt":"2025-11-24T10:00:56","guid":{"rendered":"https:\/\/its.tsolkas.com\/en\/?page_id=1032"},"modified":"2026-01-16T10:19:36","modified_gmt":"2026-01-16T10:19:36","slug":"intelligent-soc","status":"publish","type":"page","link":"https:\/\/its.tsolkas.com\/en\/intelligent-soc","title":{"rendered":"Intelligent SOC"},"content":{"rendered":"<h3>MACHINE LEARNING AND SOAR AUTOMATISMS<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1246 size-full\" src=\"https:\/\/its.tsolkas.com\/wp-content\/uploads\/m2i\/2024\/07\/types-of-machine-learning.jpg.optimal.jpg\" alt=\"\" width=\"2551\" height=\"1389\" \/><\/p>\n<p>\u201cLearning is any change in a system that produces a more or less permanent change in its ability to adapt to its environment\u201d \u2013 Herbert Simon. Machine learning is the study of algorithms that improve their performance, with given tasks and with experience. The automation tools we use for Security Orchestration Automation and Response &#8211; provide procedures that can be used to detect and process security threats. Using SOAR and AI, a fully or semi-automated response takes place, which we can adapt to the wishes of our customers. SOCs like OSCAR \u00a9 provide an integrated security management platform that leverages automation and machine learning. They enable the detection of security threats in real time and respond to them with intelligent measures, either fully automatic, semi-automatic or even manual.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1296 size-full\" src=\"https:\/\/its.tsolkas.com\/wp-content\/uploads\/m2i\/2024\/07\/Bildschirm\u00adfoto-2024-07-29-um-10.33.49.png\" alt=\"\" width=\"2559\" height=\"1399\" \/><\/p>\n<p>With OSCAR, we coined the term \u201cbusiness security\u201d for the first time. By business security we mean that employees outside of a company&#8217;s cybersecurity department receive added value for the business through the SOC. To this end, we have equipped OSCAR with self-learning AI-OT sensors, which allow more information used by the business to flow into the SOC and be retrieved. The SOC thus reliably monitors the OT. We can currently cover the rail, safety, energy and medical industries. We are constantly looking for more AI-controlled sensors in the world to expand our offering.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1297 size-full\" src=\"https:\/\/its.tsolkas.com\/wp-content\/uploads\/m2i\/2024\/07\/Bildschirm\u00adfoto-2024-07-29-um-10.36.59.png\" alt=\"\" width=\"2563\" height=\"1404\" \/><\/p>\n<p>OSCAR \u00a9 strives to improve enterprise vulnerability management by providing a centralized platform powered by AI and SOAR technology and powered by machine learning. This enables a proactive and efficient security strategy based on continuous learning.<\/p>\n<p>The Next-Generation Security Operations Center (NG-SOC) supports companies robustly and efficiently in the following points:<\/p>\n<ol style=\"font-size: 16px;\">\n<li>Real-time threat detection by immediately identifying a response to cyber threats to minimize potential damage.<\/li>\n<li>Advanced AI and automation by leveraging AI-driven detection and automation for faster and more accurate threat analysis and response.<\/li>\n<li>Comprehensive coverage through protection of operational technology (OT) and information technology (IT).<\/li>\n<li>Scalability by adapting flexible, scalable solutions to the growing and changing needs of your business.<\/li>\n<li>Regulatory compliance by ensuring strict regulatory requirements and industry standards.<\/li>\n<li>Protective incident management proactively manages and mitigates security incidents before they need to be escalated.<\/li>\n<li>Improved visibility into security posture through AI-driven complete insights into the network and systems.<\/li>\n<li>Cost-effective solution by reducing security management complexity and 80% of staff with a centralized SOC solution.<\/li>\n<\/ol>\n<p>OSCARs \u00a9 SOAR into the existing SIEM system (Security Information and Event Management) enables seamless data collection and processing. This means that security information is not only collected and processed, but can also be managed directly from the SOAR platform. This reduces redundancies and improves efficiency in monitoring and responding to security incidents. A central aspect in the development of OSCARs \u00a9 is maintaining data economy. Targeted data collection and processing ensures that only relevant information is used for security analyses. This not only contributes to efficiency, but also to compliance with data protection regulations and minimizing potential risks when handling sensitive data. OSCARs \u00a9 uses intelligent algorithms to analyze security data, including detecting anomalies and potential threats. These algorithms enable proactive identification of security risks and faster response to events in real time, improving organizational security and minimizing the impact of security incidents. In addition to the automated response to security events, OSCARs \u00a9 also informs those responsible about incidents, measures taken and their success. This transparent communication supports effective collaboration within the security team and enables the security strategy to be quickly adjusted if necessary.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1821 size-full\" src=\"https:\/\/its.tsolkas.com\/wp-content\/uploads\/m2i\/2024\/08\/Bildschirm\u00adfoto-2024-08-12-um-15.38.51.png\" alt=\"\" width=\"2554\" height=\"1425\" \/><\/p>\n<h3>Machine Learning<\/h3>\n<p>\u201cMachine Learning is the field of study that gives computers the ability to learn without being explicitly programmed\u201d \u2013 Arthur Samuel (1959). OSCAR \u00a9 strives to describe every pattern-based use case as machine learning with an impressive accuracy of 99.8% -based use case to train or further develop. This is done by continually learning and adapting algorithms to new data and threat patterns, continually improving the efficiency and precision of security operations. OSCAR\u00a9&#8217;s Dual Threat Detection (DTD) provides the flexibility to turn the autopilot on or off as needed, similar to an airplane. This feature allows security teams to intervene manually or automatically depending on the situation, maintaining granular control over security measures.<\/p>\n<div class=\"col-xl-12\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-859 size-full\" src=\"https:\/\/its.tsolkas.com\/wp-content\/uploads\/m2i\/2024\/07\/Doc4.jpg\" alt=\"\" width=\"1908\" height=\"1045\" \/><\/div>\n<div>\n<div id=\"otherbtcontent\" class=\"postbox__main-wrapper intelligence__main pt-75\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-xl-12 col-lg-12 col-md-12\">\n<div class=\"postbox__details-content-wrapper architecture_sectitle\">\n<div class=\"machine__learning\">\n<p>The ML training models that we use are the classic training models for supervised (inductive) learning, unsupervised learning, semi-supervised learning and reinforcement learning, as well as inverse reinforcement learning. We primarily use self-learning AI training models. Our ML experts are familiar with the thousands of machine learning algorithms that now exist and only select the best algorithms for our purposes. Our data scientists and ML experts work with our security analysts to design the optimal learning model and train the model when available algorithms and training models do not achieve the desired goal. We have quality assurance for this process.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MACHINE LEARNING AND SOAR AUTOMATISMS \u201cLearning is any change in a system that produces a more or less permanent change in its ability to adapt to its environment\u201d \u2013 Herbert Simon. Machine learning is the study of algorithms that improve their performance, with given tasks and with experience. The automation tools we use for Security &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/its.tsolkas.com\/en\/intelligent-soc\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Intelligent SOC&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":1077,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"data-protection.php","meta":{"footnotes":""},"class_list":["post-1032","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/pages\/1032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/comments?post=1032"}],"version-history":[{"count":8,"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/pages\/1032\/revisions"}],"predecessor-version":[{"id":1129,"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/pages\/1032\/revisions\/1129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/media\/1077"}],"wp:attachment":[{"href":"https:\/\/its.tsolkas.com\/en\/wp-json\/wp\/v2\/media?parent=1032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}