Page 47 - Cyber Defense eMagazine June 2024
P. 47
Crystal Eye’s best-in-class monitoring and detection capability, with more than 62,900 IDPS rules
updated daily, disrupts the attack chain from all known malware families, including APTs and all complex
and modern-day attacks. It also detects initial compromise, persistence, and lateral movement. All of this
in a single pane of glass.
Red Piranha’s in-house CESOC platform with the following immediate outcomes:
1. Increase traffic and threat visibility across network, cloud and endpoints.
2. Monitoring of the traffic mitigative response, investigation, and containment support.
The functions you want your SOC to include will depend on your organization's specific security needs
and risk profile. However, some common functions that most SOCs typically include are:
1. Security monitoring of events and alerts from tools like firewalls, IDS/IPS, antivirus. Continuous
eyes-on-glass monitoring of global network activities and system logs.
2. Incident response: Swiftly identify, investigate, and respond to security incidents.
3. Threat intelligence: Stay updated on the latest threats and vulnerabilities that could impact the
organization and keep the security team informed about them.
4. Vulnerability management: Identify vulnerabilities in the organization's systems and applications,
prioritize them based on their severity, and coordinate with the relevant teams to patch or mitigate
them.
5. On-demand digital forensics for investigating security incidents and supporting legal proceedings.
Cyber Defense eMagazine – June 2024 Edition 47
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.