Capacity Analysis

How many people are needed within a Security Operation Centre to manage security installations and alerts?
 

descrizione immagine

How can security processes be optimised? What actions are needed to respond to regulatory changes? How many people will be needed if the number of connected sites or installations increases? How many platforms to manage alerts? Are the platforms suitable for integrating several or different apparatuses and systems? How to implement systems on the Cloud? How much Cloud is needed to manage video streams? And is the bandwidth sufficient? These, and many more, are the questions our Team of 10459 Certified Analysts, Criminologists and Security Managers answer with Capacity Analysis, i.e. detailed analyses and projects that help companies and organisations manage their security processes from data.

 

 

The phases of the Capacity Analysis


The Capacity Analysis carried out by the Secursat Team is aimed at reorganising the workflows of SOCs, facilities, operational centres and more, starting with an accurate assessment of the contexts in which the company operates, the sites and the thousands or even millions of log files produced by the systems, thanks to a data processing model designed by our Team and refined over time. Our approach also reviews the analysis of the platforms in use in operational management and monitoring centres, such as PSIM, VMM, BMS, SCADA and others, analysing their operation and capacity to process data and information, to define the right mix of resources and technologies to optimise the management of processes and digitise repeated and routine ones.  

descrizione immagine

 
What are the objectives?


Our team's objective is to organise operational security structures to improve process management, the use of internal and external resources, define the skills needed to achieve the desired KPIs, and implement the right technological architecture to respond, not only to today's needs, but also to evolving technological, organisational and regulatory scenarios.
Thanks to our expertise and experience, we develop answers to the needs of regulations such as NIS2 and Dora, and resilient, flexible and scalable security processes, thanks to no-code systems, architectures open to integration and management schemes based on organised data-sets that can be processed from intuitive and simple summary dashboards.

descrizione immagine

 

We start with data, often disorganised and not aggregated, to search for useful data and improve the security organisation by following the entire development process.
 

 

Leggi altre News

Secursat e Il Privacy Officer

Consulting
Gdpr 25 maggio 2018 - uno scenario in continuo cambiamentoCome è noto, il 25 maggio 2018 entrerà ufficialmente in vigore il GDPR (General Data Protection Regulation), il nuovo Regolamento Europeo 2016/679 in merito alla ...

Sostenibilità tra G20 e l’ONU COP-26 a Glasgow

Rischi e Scenari

Si è da poco concluso il G20 di Roma mentre la conferenza ONU COP-26 di Glasgow è alle battute finali, due manifestazioni di alto profilo che hanno visto e che vedranno confrontarsi i leader mondiali sui temi del cambiamento climatico e sulla ...