Hitachi Group Global Network




Middle East and Africa



Managed Security Services
You are here: Home \ Managed Security Services

Managed Security Services

Protect your critical data, monitor your environment for intrusions and respond to security incidents with 24/7 managed security services. Before using Managed Security Services, we recommend assessing your cybersecurity posture first to make sure you know where you stand, what’s missing and where you want to go.

Do you really need a Managed Security Service Provider?

Find out if an MSSP would add value to your business or not. Download our checklist to self-assess your needs.

Why Managed Security Services?

In today’s digitalized world, companies of all types and sizes need to protect their critical data assets against breaches and intrusions. Unfortunately, most of them don’t have the necessary time, money or resources to monitor their environment themselves. That’s where a Managed Security Service Provider (MSSP) comes in.

As your embedded security partner, we move the costly and time-consuming work of security monitoring out of your IT department, freeing you up to do the work of keeping your infrastructure in top shape. With 24/7 managed security services, you can improve your organizational security to protect your business and maximize ROI. Finally, you can focus on running on your business with the peace of mind that your environment is secured around the clock.

What You Get

computer graphic

24/7 Threat Monitoring & Protection

Continuous monitoring of your environment • Real-time analysis and event correlation • Incident response management • 2-hour log review guarantee • 15-minute escalation of discovered threat activity • Customizable escalation process • Analysts in 5 global SOCs


Security Posture Overview and Reporting

360-degree view of your cybersecurity maturity • Monthly executive reporting with concrete recommendations • Cybersecurity analytics tool for tracking and measurable ROI • Strategic risk management guidance • Improved alignment of security strategy and business goals


Integration with

Easy integration with your existing security devices and SIEM tools (ArcSight, Splunk, LogRhythm, QRadar, AlienVault, etc.) • Integration with third-party security devices (Tripwire, Rapid7, anti-DDoS, IBM AS/400 iSeries, Linux/Unix, Windows OS, etc.) • Cloud security monitoring of Office 365 logs


Analysis of
Large Data

Automated log and security event correlation • Consolidated security management from one unified security portal • Customized correlation rules to filter noise and minimize false positives • Fine-tuned setting for optimized analysis • 2-hour log review guarantee


Easy and

Streamlined sensor deployment process • Optimal service efficiency within about 3 months • Smooth configuration and process efficiencies • No more lengthy configuration and fine-tuning of your SIEM (which can take up to a year in most cases)


Dedicated Team
Security Experts

Extend your in-house IT team with certified security experts • Benefit from global security expertise & threat intelligence • Get assistance and actionable recommendations from a dedicated Information Security Specialist assigned to your organization


Cost &

No need to buy expensive technology • No need to hire your own security staff • No time wasted reviewing your logs • Optimize your time to focus on your priorities while we take care of your security needs



24/7 log monitoring for PCI DSS compliance • Self-serve vulnerability scanning • Improved alignment with security control frameworks (CIS 20 CSC, NIST, ISO 27001/2, PCI DSS, GLBA, HIPAA)

Powered By ArkAngel

Our managed security service is powered by our proprietary ArkAngel platform – the single pane of glass through which you can view your entire organizational security posture at a glance. This platform unifies the various types of technical security data along with tools for translating those inputs into clear information about business risk, divided into relevant categories and scored with probability down to the individual asset level.

While many SIEM tools are purposely built to be generalized to any organization and thus require a year (or years, in certain cases) of configuration to tune properly, ArkAngel was built in-house specifically to support our own security practice. It integrates with virtually any existing security solutions. The end result is that we can be up and running within months, not years, and our team can catch any breaches that occur almost as fast as they occur instead of getting bogged down in an ocean on non-critical information.

Features & Functionalities

Our 24/7 managed security services come with a variety of default features and functionalities, all of which are included in our standard MSS offering. In addition, you can choose to include some or all of our add-on services to the mix, depending on your business context and requirements.


  •   24/7 Real-Time Threat Monitoring
  •   Monthly Security Reporting
  •   24/7 Access to ArkAngel Platform
  •   Monthly Service Review Meeting
  •   Dedicated Information Security Specialist
  •   Secure Communications Channel
  •   Secure Retention of Sensible Documents
  •   Security Control Integration
  •   Business Detection Rule Implementation
  •   2-Hour Incident Escalation Guarantee
  •   Control-Based Approach

Log Monitoring Capabilities

ArkAngel log monitoring identifies security-related events to ensure that you are responding to valid threats, that you are applying the right response, and that your critical assets are properly protected.

Log monitoring covers the following:

  • Anti-virus / spam / spyware / malware
  • proxy servers
  • Cloud
  • Virtualization
  • DNS
  • Operating System
  • Web Server
  • Authentication protocols
  • IDS
  • IPS
  • Firewall
  • Vulnerability Scan
  • Security products
  • Mail
  • DHCP
  • DLP
  • Centralized management
  • Database
  • File Servers
  • Network logging

Our sensors extract, parse and load data from industry appliances, devices, and technologies such as, and not limited to, application servers, databases, iSeries AS 400 systems, network firewalls, intrusion detection and prevention systems (ID/PS), VPNs, routers and switches, business-critical systems, noncritical servers and endpoints generating logs.

Logs currently monitored by ArkAngel:

  • MS SQL
  • Apache HTTP
  • Bit9
  • Checkpoint
  • Cisco
  • Citrix
  • IBM AS/400 & DB2
  • McAfee
  • Network logging
  • NSCD
  • NXT
  • Oracle
  • Ossec
  • Paloalto
  • RACF
  • Radware DefensePro
  • RSH
  • snare2x
  • SNMP
  • Sourcefire
  • SSH
  • Symantec
  • Syslog
  • Tripwire
  • UNIX
  • VMWare
  • VPN connection (FORTIGATE)
  • WAF
  • Websense
  • Windows
  • Wireless Serious Alert



    Our control-based approach guides you to a better security practice and greater security maturity using the 20 CIS Critical Security Controls or any other control framework that aligns with your business (NIST, ISO 27001, HIPAA, etc.). Improve your organizational security posture through ongoing improvement of your internal security practice.


    Instead of simply reviewing your organization’s incidents one by one, you can quickly evaluate your organization’s security posture and apply strategic risk management principles. Our guidance on best practices will help you decrease your risk to an acceptable level.


    ArkAngel’s technology-agnostic approach allows you to easily integrate with any security device in the network to collect and aggregate alerts, logs and other device-specific information.


    The entire security operation and risk profile is visible through one unified source: the ArkAngel portal. There is no need to translate technical vulnerabilities into risk or asset values, because it is already integrated in one comprehensive panel.


    We understand how important it is to have access to security experts and will assign a dedicated Information Security Specialist (ISS) to each of our managed security service customers. This way, you will have direct contact with a technical security expert who will be able to answer your questions, provide customized recommendations based on your environment and industry best practices and standards, and help you improve your security posture.

Why Us

  • We focus exclusively on security. Nothing else.
  • We see the big picture. Our cybersecurity analytics provide a 360-degree view on your overall security posture.
  • We are global. We have accumulated security intelligence from customers in 50+ countries through our SOCs on 4 continents.
  • We are technology agnostic. Our ArkAngel platform can integrate with any data source or SIEM solution, and we will not try to sell you a solution that won’t make sense for your business.
  • We believe in the power of integrated security. We understand the importance of amalgamating IT, OT and IoT environments to maximize efficiencies and improve alignment.
  • We are your security partner. We are a collection of truly experienced and passionate security analysts who have been using a proven method for almost 20 years.
  • We maximize ROI. We help you focus your security initiatives on high-impact strategies that will deliver measurable results without busting your budget.
  • We are certified. Our managed security service delivery from our head office in Blainville, Quebec, Canada, has been ISO 9001:2015 certified since 2011.
  • We are Hitachi. Being part of the global Hitachi network means that we don’t only have access to the latest technologies and resources, but also that we are part of something bigger. At Hitachi, everything we do is centered around our vision of social innovation. Social innovation starts with an idea – one with the power to change everything. At Hitachi Systems Security, we’re committed to securing businesses around the globe to help them face their cybersecurity challenges of today and tomorrow.


Still curious? Get to know us better by clicking here.

Related Articles

How AI can Help and Harm Cybersecurity

Akarion and Hitachi Systems Security Working Together to Enhance Digital Trust

How Security+Privacy is an Enabler for Digital Transformation

COVID-19: Could Going Passwordless Make Us More Secure?


Interested in getting a quote? Contact us today and find out how our 24/7 managed security services can help you protect your business, strengthen your security posture and meet compliance requirements.