Workplace
Microsoft 365-powered for smart, secure, and flexible workspaces, seamlessly integrating cutting-edge technologies and identity services.
Contact
Company
Pioneer in the Cloud: Your top Microsoft partner for comprehensive cloud solutions with a Blueprint-based approach and Infrastructure-as-Code expertise.
Contact

Cloud Security Operations Center

Cloud Security Operations Center

Our reliable Managed Extended Detection and Response (MXDR) service offering with 24/7/365 proactive hunting, monitoring, and response capabilities, based on seamless integration with the Microsoft Security platform.

Cloud Security Operations Center
What is the Cloud Security Operations Center
Visual Microsoft

24/7 highly qualified investigation & analysis

ISO 27001 certified service

The best experts in the industry with more than 25 years of experience in the infosec community

Covers OT/IoT, on-premises and various cloud environments

Personal contact to build a strong analyst-customer relationship

Threat Intelligence Research, Detection Engineering and Automation

glueckkanja CSOC Building Blocks

Customer Stories

Uniper relies on M365 and CSOC

Uniper Case Study
With the introduction of Microsoft 365 and other services from award-winning partner glueckkanja, Uniper transformed its workplace culture and optimized collaboration and security across the organization.

This is how we protect your environment and data

Defender for Endpoint

Defender for Cloud

Defender for Office 365

Defender for Cloud Apps

Entra ID Identity Protection

Defender for Identity

Defender for IOT

Microsoft Sentinel

Microsoft Copilot for Security

What Microsoft says

Sponsored by Microsoft *

As one of the few MXDR partners worldwide, we offer a Microsoft-sponsored MXDR workshop: In your environment, we will conduct a time-limited proof-of-concept for our CSOC service. This includes among other things:

  • 24/7 monitoring of all connected assets
  • Detailed, qualified analysis, hunting and evaluation of incidents
  • Incident Response based on Microsoft Sentinel Playbooks and IR capabilities in Defender products
  • Monitoring of the threat landscape & development of use cases for new threats

* Note: The prerequisite for funded sponsorship is that Microsoft recognizes the company as qualified.

Step by Step to more IT Security

Initial Security Audit & Recommendations
Initial Security Audit & Recommendations
Roadmap Workshops
Roadmap Workshops
Implementation of Security Solutions
Implementation of Security Solutions
Use Case Planning & Implementation
Use Case Planning & Implementation
Blueprint Matching
Blueprint Matching
Connection of Data Sources
Connection of Data Sources
Initial Baselining
Initial Baselining
Technical Interface Integration & Management
Technical Interface Integration & Management
Technical Onboarding to CSOC
Technical Onboarding to CSOC
Start of Incident Response Service
Start of Incident Response Service
Process Optimization, Playbook Creation & Automation
Process Optimization, Playbook Creation & Automation
Connection of Additional Data Sources
Connection of Additional Data Sources
TI Management (incl. IoC Handling)
TI Management (incl. IoC Handling)
Use Case Improvements & Repository Additions
Use Case Improvements & Repository Additions
Extended Automation
Extended Automation

Security Expertise

MISA Member
Advanced Specialization
Allianz Cyberwehr
ISG Cyber Security Rising Star

Contact us now

Jan Geisbauer
In most of our emergency operations, we repeatedly find that IT was not well enough prepared for attacks. A proactive security check is therefore an efficient investment in more security to reduce downtime.
Jan GeisbauerSecurity Lead