Mobile SOC Service
As experts in cyber security for mobile devices, we offer mobile threat defence (MTD) and SOC services from a single source as part of our mobile threat defence management service. This means you can leave the cyber defence of your mobile devices to us and concentrate on your main tasks.
Why Nomasis Mobile SOC Service?
An MTD system protects smartphones from known security-relevant events and is set to a defined security level during installation.
If vulnerabilities are detected, the devices, apps or networks are blocked depending on the setup in order to prevent and avoid damage. Device users often require support to clean up the devices, and customer help desks are usually not experienced enough with these tasks or do not have sufficient capacity and knowledge.
Our Mobile SOC Service combines your deployed Mobile Threat Defense (MTD) product with the corresponding Security Operation Center (SOC) services. You decide which parts of the Mobile SOC Service you manage yourself and which are operated by us.
Depending on your decision, we can provide support and operation for your MTD product or take over the monitoring of your mobile device fleet for you. With our specially developed security playbooks for mobile device platforms, you or we can react quickly and efficiently to security gaps, threats or attacks with the right measures.
By the way: We are also happy to support you in the selection and implementation of the appropriate MTD product and work together with well-known partners for this purpose.
How does the Nomasis Mobile SOC Service work?
The individual components and interfaces are defined and documented in the initial project based on the specific customer requirements.
Our service offers the following components and interfaces:

Features
The aim of the Nomasis Mobile SOC Service is to actively process events, vulnerabilities, changes and security-relevant actions and to actively maintain and improve the protection of the smartphones, apps and networks involved. The service includes the following activities:
Mobile Threat Defense
We offer an SLA for your MTD product with corresponding response and intervention times and are available to you by telephone or e-mail ticket in the event of incidents. We also take care of any escalations with the product vendor and coordinate the enquiry until it is resolved. At the same time, we ensure that the operation of your MTD solution is guaranteed and that the security guidelines for your mobile device fleet remain up to date.
Surveillance
Within Surveillance in combination with your MTD product, continuous monitoring of your mobile device fleet is ensured in order to detect and respond to potential threats, anomalies or security breaches (incidents) at an early stage. The aim is to ensure the integrity, availability and confidentiality of your IT resources and to minimise the risk of cyberattacks, data loss or unauthorised access.
Attack response
Attack response involves taking coordinated measures in accordance with the security playbooks to respond to an ongoing or identified cyberattack, neutralise it and minimise the impact on systems, data and business processes. It is a central component of incident response and aims to effectively detect, contain, analyse and ultimately eliminate threats.
Vulnerability Management
With vulnerability management, we ensure that vulnerabilities in your mobile device fleet (operating system; network connections and apps) are identified, assessed, prioritised and remedied. The aim is to minimise the risk of attacks by identifying and closing security gaps at an early stage.