Integrated Telecom Company (ITC), a leading Saudi based telecom and ICT service provider, and Aiuken Cybersecurity, an international company specialized in cybersecurity solutions, headquartered in Madrid, Spain, signed a partnership agreement to promote the ITC Security Operations Center (SOC) offerings of Managed Security Services (MSS) and cybersecurity solutions portfolio.
ITC works with a number of IT specialized partners to provide communication solutions, managed services and cloud services, which rank it at the forefront of the Information and Communications Technology (ICT) service providers in KSA thus enhancing its capability to provide the best services which suit the government and business sectors in the Kingdom.
The step comes as a quick response to the Saudi government's strategic initiative of establishing the new "National Cybersecurity Authority". ITC is positioning itself as a key player in achieving the objectives of the Authority in terms of protecting the government and business organizations infrastructure network, data and their business continuity as well as assisting in the implementation of compliance policies, security procedures and raising awareness of cybersecurity in the Kingdom.
As part of this agreement, Integrated Telecom Company leverages the benefits of its complementary areas of ICT expertise to monitor customers' infrastructures 24/7 and to better prevent, detect and respond to cyberattacks. On the other hand, Aiuken Cybersecurity will bring to the partnership its end-to-end global expertise in cybersecurity to help prevent cyberattacks on ITC customers in Saudi Arabia.
Through this partnership, ITC and Aiuken agree to take ITC's Security Operations Center (SOC) to the next level in-line with the latest global industry standards by deploying the most advanced worldwide security tools and highly qualified security experts.
As a result, ITC will provide a higher level of security services to its enterprise customers and government entities with proactive monitoring, notification and management for any security incident, thereby enhancing the protection of networks, IT systems, hardware and software components, services and data.