Page 50 - Cyber Defense eMagazine for July 2020
P. 50

Benefits of A Security Operation Center (SOC)

                                 By Pedro Tavares,  Editor-in-Chief seguranca-informatica.pt


            The creation of a Security Operations Ce nter (SOC) has increasingly stood out as something necessary
            to help companies defend themselves against damage caused by cyber-attacks. SOC is considered the
            kernel of an organization's security operations, the purpose of which is to provide detection and response
            services to security incidents.

            The creation of a SOC from-scratch involves a large investment in human and technological resources,
            especially when it is intended to maintain operations on a full-scale 24×7. Implementing a SOC solution
            goes far beyond buying technologies and putting it into operation. First, there is a great shortage of
            qualified professionals which makes it a real challenge to bring them into your organization. From a
            technological perspective, the right equipment and the right platforms can help you automate or at least
            optimize your incident detection and response capabilities. How to decide the best option: Implement or
            Hire a SOC? The answer is not simple.



            Create your own SOC or Hire a third-party SOC

            One of the advantages of creating your own SOC is having a team exclusively dedicated to achieving
            your goals. This team will have a deep understanding of the business. They will better understand the
            general context around events and have more knowledge about how you operate in contrast to a third
            party SOC.






            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         50
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   45   46   47   48   49   50   51   52   53   54   55