Security Operations Center technology enables identification of an attack on an IT system almost in real-time. The composition of the essential technological tools used in SOC includes specialized software for identification and classification of ICT systems, analysis and correlation of system logs, network monitoring, the performance of security audits, analysis of threats in the network or threat hunting. Additionally, SOC provided by BLUE energy operates based on dedicated tools to manage knowledge and the course of the incident handling process. It is important that the technologies used can be included in other processes already functioning in the organization, such as risk analysis or vulnerability management.