- The newest Echo Show 8 just hit its lowest price ever for Black Friday
- 기술 기업 노리는 북한의 가짜 IT 인력 캠페인··· 데이터 탈취도 주의해야
- 구글 클라우드, 구글 워크스페이스용 제미나이 사이드 패널에 한국어 지원 추가
- The best MagSafe accessories of 2024: Expert tested and reviewed
- Threads will show you more from accounts you follow now - like Bluesky already does
What Is a Security Operations Center (SOC) and What Happens in One?
Data breaches are costing organizations millions of dollars on average. In its 2020 Cost of a Data Breach Report, IBM found that a data breach cost the average organization $3.86 million. This price tag was even greater for organizations located in the United States and operating in the healthcare industry at $8.64 million and $7.13 million, respectively.
What’s behind this price tag, you ask?
It could be the fact that it took organizations 280 days on average to identify and contain a breach, according to IBM. Let’s put it this way: digital attackers had nearly a year to hide within their victims’ systems and networks. That’s ample time to discover and move laterally to business-critical assets, at which point they can exfiltrate sensitive information. Such malicious activity ultimately translates into recovery costs, compliance penalties and legal fees.
The Value of a SOC
Organizations need a way to improve their ability to detect incidents on a timely basis. Towards that end, they can consider creating a Security Operations Center (SOC) to proactively monitor their organizations’ security. A SOC might consist of a physical location where SOC analysts oversee the employer’s ability to operate securely, notes CompTIA, or it could just be a team of experts responsible for providing the same security function.
SOC analysts tend to do the same type of work in either setup. Their duties range from proactively monitoring for threats using log analysis to addressing vulnerabilities and coordinating an incident response plan. All of this happens within a centralized business unit.
As such, SOCs bring certain benefits to organizations. One of the most important is continuous protection. The idea is to have the SOC staffed at all times so that it can monitor an organization’s network and/or facility 24/7, explained Cyber Defense Magazine. This type of protection helps to minimize response time and expedite the analysis process. Subsequently, SOCs are equipped to investigate a security issue before it develops into a data breach, thus saving organizations time and money in the process.
Overcoming the Challenges Facing Today’s SOCs
It’s important to remember that there are certain things standing in the way of organizations creating an effective SOC. As noted by EC-Council, organizations are struggling against the cybersecurity skills gap to find talented professionals who can serve on their SOC’s staff. Absent those skilled personnel, SOCs might not have the necessary expertise to correlate threat data and streamline critical security functions.
There’s also the challenge of finding tools. SOC analysts need robust solutions to help them detect and manage security issues if they are to prevent a data breach. In purchasing something for their SOCs, organizations need to resist the urge to be reactionary and instead take a strategic approach to their security investments.
“Most organizations start their SOC journey with an evaluation of existing security controls,” notes Gartner. “When they feel the need to purchase a specialized tool, they face a paradox of choices and too many possibilities in the market. Gartner sees many organizations select a tool primarily to solve the most recent security incident because they get budget right after the event. They have the mandate to ‘make sure it never happens again,’ and pick the shortest path.”
Organizations can respond by playing the long game and working with a trusted vendor like Tripwire. All its solutions can help SOC analysts fulfill their essential duties. Consider Tripwire Enterprise, for instance. It can monitor all assets (Operating Systems, Network Devices, Directory Services, Databases, and Virtual Infrastructure) for change and issue an alert when any change is detected. Add in the capability to assess systems against industry standards such as CIS, NIST, and ISO compliance, and organizations have a solution that can shine a light on systems that require attention. Tripwire Enterprise Apps (TEIF, DSR, and Event Sender) integrate with leading ITIL change management tools to identify change (promoting authorized changes and reporting unauthorized), approve changes due to OS patching and send detailed log data to SEIM for analysis.
The benefits of Tripwire’s offerings to SOC teams don’t end there. Consider the following:
- Tripwire IP360, Tripwire’s vulnerability management solution, will scan your networks and collect agent data to assess systems for vulnerabilities. Powered by Tripwire’s VERT Team, the collected data is then presented to you with a risk assessment based on multiple factors observed about the vulnerabilities as they are detected in the real world. IP360 also has the capability to discover assets that are on your network.
- Tripwire Log Center is a log management tool that can ingest and normalize events from devices and deployed agents. It can then generate alerts based on correlation rules that can be tailored to the environment.
- Tripwire’s solutions for Industrial Controls Systems listen to the traffic on the network to help identify threats. Paired with Tripwire Log Center, this gives organizations a means for capturing, normalizing and alerting on deviations from baseline.