RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

F6 SOC MDR

Product
Developers: F6 (formerly F.A.C.C.T.)
Date of the premiere of the system: 2025/07/17
Branches: Information security
Technology: Information Security Management (SIEM)

2025: Launch of Full Service SOC MDR to Prevent and Eliminate Cyber Incidents

On July 17, 2025, F6, a developer of technologies to combat cybercrime, announced the launch of SOC MDR.

SOC MDR

According to the company, the modern landscape of cyber threats requires not only the use of reliable technical means of protection, but also the organization of continuous monitoring of the entire infrastructure - both the internal digital environment and the external perimeter.

According to F6, 9 out of 10 Russian companies have problems on the outer perimeter, which could become a potential entry point into the infrastructure. Exploitation of outer contour problems is and will remain in the near future one of the most productive vectors for attackers.

The focus of SOC MDR is the outer perimeter zone, where F6 provides constant centralized monitoring, which is sometimes extremely difficult for the customer to implement in-house.

The updated approach to analyzing external infrastructure allows not only continuous and prompt detection of vulnerabilities, configuration errors and services available for attack, but also timely elimination of them before they are exploited by attackers. Moreover, each detected problem is not only highlighted by the asset owner, but also becomes the subject of a thorough investigation to ensure that it has not been previously exploited and that cybercriminals have not entered the infrastructure.

The SOC MDR focuses both on timely detection of human-operated attacks, using artificial intelligence, and on active response to deter and neutralize these threats, until they can realize themselves.

Despite the existence of a large number of preventive defensive solutions, the internal perimeter remains the main battlefield when it comes to active counteraction by a motivated and professional attacker. Only specialists with appropriate expertise and modern cyber defense tools can protect the already attacked infrastructure.

When traces of the presence of intruders in the corporate network are detected, it is not just the timely detection of an attack that is critical, but the speed and quality of the response. It is required to immediately begin localizing the incident and finding out its causes in order to minimize damage and prevent the attack from developing. It is here that traditional SOCs face restrictions: monitoring functions are separated from response procedures, and the main responsibility for eliminating the threat falls on the already overloaded information security team of the client.

F6's SOC MDR closes this gap: the F6 team not only carries out constant monitoring, but also independently makes decisions about countering the threat without shifting the task to the client. When confirming the incident, F6 experts immediately:

  • isolate the attacked devices;
  • block malicious processes, accounts and tools of attackers;
  • implementing threat neutralization scenarios up to infrastructure recovery.

To effectively counter cybercriminals, you need not one technology, but a system that combines tools and expertise. The SOC MDR center has its own F6 Threat Intelligence system, which daily enriches the service with up-to-date information about new tactics and tools of attackers. The combination of cyber intelligence data with its own comprehensive solutions for countering threats allows you to keep all critical attack vectors under proactive control. At the same time, the security tools already implemented by the customer are seamlessly integrated into the analytical architecture of the service, which allows you to maintain previous investments and increase the level of security.

The SOC MDR service from F6 implements a full investigation cycle with the establishment of all chronology and causes, since in addition to retaliatory measures, it is critical to carefully analyze the entire life cycle of the attack in order to establish the source of penetration.

If this is not done, there is no guarantee that, having repelled the current attack, the company will not soon face a new one that will develop according to an alternative scenario that is no longer so successful for the defenders.

File:Aquote1.png
The service covers all key stages: from proactive threat monitoring to incident resolution. Companies, in turn, receive turn-key external security management.

noted Yaroslav Kargalev, head of the F6 Cybersecurity Center
File:Aquote2.png