Location: Americas

Organization Type: Private

Employees: 501-1,000

Dedicated IT Staff: 10

Needs And Requirements:

To strengthen resilience and governance in an increasingly complex threat landscape, the organization modernized its security operations to deliver continuous threat monitoring, improved detection accuracy, and centralized security governance. The organization wanted to transition to a cloud-native security analytics platform while ensuring uninterrupted protection, regulatory alignment, and operational resilience. In addition to deploying Google SecOps, the client required a full MSS, platform optimization, and vulnerability management for thousands of endpoints.

Main Challenges:

Fragmented Security Tooling and Limited Visibility: Multiple log sources and legacy SIEM infrastructure limited correlation capabilities and reduced real-time visibility across network, endpoint, identity, and cloud environments.

Complex SIEM Migration and Data Retention Requirements: Transitioning SIEMs while maintaining compliance, audit continuity, and historical forensic access required careful planning and execution.

Need for 24×7 Threat Monitoring and Detection Engineering: The client required around-the-clock monitoring, proactive threat hunting, and ongoing use-case tuning without expanding internal security resources.

Solution:

24/7 Managed Security Services: 

Hitachi Cyber delivered a fully managed Google SecOps–enabled security operations program combining platform deployment, continuous monitoring, and ongoing optimization. The engagement included provisioning and configuring the Google SecOps SIEM and SOAR environment, onboarding data sources, developing baseline detection use-cases aligned with MITRE ATT&CK, and implementing secure log ingestion pipelines with normalization into the Unified Data Model. Historical data was securely migrated to Google Cloud Storage to ensure audit and forensic continuity.

Through a global Follow-the-Sun SOC model, Hitachi Cyber provided 24×7 MSS, including alert triage, enrichment, incident escalation, proactive threat hunting, and continuous detection tuning. Ongoing platform management, SOAR playbook optimization, vulnerability management for up to 2,500 endpoints, and governance support ensured sustained visibility, operational resilience, and continuous improvement of the client’s cybersecurity posture.

 

Outcomes:

The client achieved a fully operational, cloud-native security operations capability supported by 24×7 global monitoring and advanced detection engineering. Visibility across IT assets was significantly improved through structured log ingestion, custom parsing, and optimized correlation rules. The successful migration from legacy SIEM infrastructure preserved compliance requirements while modernizing detection and response capabilities.

Next Steps:

The client will continue leveraging Hitachi Cyber’s services to expand detection coverage, refine playbooks, and onboard additional sources as the environment evolves.

After this four-year contract, the client will evaluate the evolution of its security operations maturity and define the next strategic phase with Hitachi Cyber.

Share This Case Study