The Ultimate Guide to Security Operations Centre
2022 edition
Overview
Also known as SOC.
Generally operated by larger organisations or as a shared service provided by a Managed Services Provider, the Security Operations Centre is a centralized function handling information security issues, challenges, protective measures, and intelligence. The SOC is tasked with managing and maintaining organisational security posture, and typically addresses the issue from the three related factors of people, process and technology, a combination of which is essential for appropriate cybersecurity risk mitigation.
Top players
Recent news

About Cybersecurity
Preparing your IT security defences for the year ahead
Last week

About Network Security
IronNet releases advanced capabilities for NDR solution
This month

About Gigamon
Gigamon helps tech teams and customers at Wyndham ANZ p...
Wed, 16th Nov 2022

About Google
Lacework announces CNAPP integration with Google Cloud
Thu, 27th Oct 2022

About Trustwave
Trustwave launches enhanced co-managed SOC capabilities
Tue, 25th Oct 2022
More news

About LogRhythm
LogRhythm announces LogRhythm Axon and new solution enh...
Tue, 4th Oct 2022

About Software-as-a-Service
Vectra AI attributes significant growth to expansion an...
Mon, 5th Sep 2022

About CrowdStrike
Vectra AI reinforces leadership as CrowdStrike partner
Wed, 20th Jul 2022

About Microsoft
PwC NZ unveils new Cloud Security Operations Center
Wed, 18th May 2022

About ThreatQuotient
ThreatQuotient celebrates multiple industry award wins
Fri, 18th Mar 2022
Even more news

About Kaspersky
More elusive and persistent - Kaspersky researchers unc...
Thu, 27th Jan 2022

About Cloud
Google Cloud acquires cybersecurity provider Siemplify
Thu, 6th Jan 2022

About Barracuda
Stellar Cyber integrates security platform with Barracu...
Fri, 12th Nov 2021

About LogRhythm
AdvantageNZ takes the win at LogRhythm partner awards
Thu, 21st Oct 2021

About Breach Prevention
Palo Alto Networks brings more power to security teams ...
Thu, 2nd Sep 2021
Other guides
You can read other related guides from Security Information and Event Management, Cybersecurity, Artificial Intelligence, Firewall, and Network Management.
Powered by