SIEM Management

Provided by TELEFONICA MOVILES ARGENTINA S.A.
Aceleramos la implementación de la tecnología a través de nuestros servicios de Ciberseguridad y Cloud.
Overview

Desde Telefónica trabajamos para simplificar el ecosistema tecnológico de Ciberseguridad y Cloud, construyendo la solución más adecuada para tu empresa, con desarrollos innovadores, basados en tus necesidades y trabajando con los mejores Partners. Vamos juntos durante todo el proceso, con los mejores profesionales, capacidades y un soporte especializado de extremo a extremo.

  • Industries
  • Cross Industry
  • Banking
  • Automotive
  • Aerospace and Defense
  • Industrials and Manufacturing
  • Healthcare
  • Energy and utilities
  • Financial Markets
  • Life sciences
  • Chemicals and petroleum
  • Electronics
  • Insurance
  • Government, Federal
  • Telecommunications
  • Government, State/Provincial/ Local
  • Retail
  • Medical devices and supplies
  • Travel and Transportation
  • Consumer products
  • Wholesale Distribution & Services
  • Computer Services
  • Education
  • Media & Entertainment
  • Professional Services
  • Healthcare providers
  • Construction and engineering
  • Agriculture
  • Hospitality
  • Real Estate
  • Machinery
  • Public safety and policing
  • Social services
  • Mining and extraction
  • Mining and metals
  • Oil and gas
  • Topics
  • Cybersecurity
  • Deployment types
  • SaaS
  • On-premises
  • Languages supported
  • Spanish
  • Regions and countries supported
  • Americas - Argentina, Colombia, Ecuador, Uruguay, Venezuela (Bolivarian Republic of)
Benefits End-to-End Management
Our teams handle SIEM delivery, configuration, deployment, and installation, providing close guidance and support throughout the process to the client
Detection and Customization
A wide correlation and aggregation catalog tailored to the client's assets and processes, supported by experts maintaining a personalized information
24x7 Monitoring and Detection
Including triage, analysis, false positive elimination, and remote escalation of confirmed threats under orchestrated procedures.
Information about the companies and solutions listed in this directory is provided by each company and is not validated by IBM unless otherwise noted.