Operations

3/7/2018
11:22 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions

Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.

SUNNYVALE, CA– March 7, 2018Arctic Wolf Networks, a leading security operations center (SOC)-as-a-service company, today announced that Trusource Labs, an Austin, Texas-based provider of corporate technical support services with a focus on IoT devices, has selected AWN CyberSOC™ to meet their growing cybersecurity needs. After careful consideration, Trusource decided the service’s turnkey threat detection and response capabilities were far superior to building a SOC internally. 

Trusource, which has experienced momentous growth since its founding in 2013, has sensitive client databases that house personally identifiable information (PII) for tens of thousands of individuals, creating a need for enhanced security to match their increased exposure. The busy IT team realized it needed more robust security operations and considered a security information and event management (SIEM) system that would provide complete visibility across its distributed IT infrastructure.  The team found a SIEM to be highly complex and required a dedicated team of security experts. 

After carefully evaluating the pros and cons of purchasing and deploying a SIEM for SOC capabilities, Trusource concluded that buying the AWN CyberSOC service was the right solution.  It provides a turnkey SOC-as-a-service and installs in minutes, combining the necessary people, process and technology for world class security operations. Trusource estimates that they were able to save up to 90 percent of what it would have cost to build it themselves.

“For organizations seeking a security operations center, Arctic Wolf’s AWN CyberSOC is the perfect solution. To do the equivalent internally would have cost us far more and taken many months,” said Larry Chapman, Trusource Labs IT Manager. “Arctic Wolf’s Concierge Security Engineer (CSE) acts as an extension of our IT team and provides a level of service that can only be described as incredible.”

In addition to the cost savings, AWN CyberSOC provides real-time insights and the benefit of Hybrid AI, a combination of machine learning and human expertise, so Trusource’s threats and security incidents can be quickly identified and receive an immediate response. The solution gives the IT team peace of mind by providing 10X better threat detection with 5X fewer false positives, a benefit that has already proven valuable for Trusource during a couple of phishing alerts that were immediately identified and remedied by AWN CyberSOC.

“Rapidly growing companies like Trusource should focus on their business and use SOC-as-a-service for advanced threat detection and response,” said Brian NeSmith, CEO and Co-Founder of Arctic Wolf Networks. “We excel at providing enterprise-class security operation centers for companies who do not have the expertise or multimillion-dollar budgets to throw at the problem.”

Trusource now has over 575 employees and a 24/7 international operations center in Limerick, Ireland. The customized compliance reporting it receives ensures that, with its expanding range of global clients, including those in the healthcare and financial services industries, industry regulations such as PCI, HIPAA and ISO 27001 are met or exceeded.

Additional Resources:

About Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response.  There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit https://www.arcticwolf.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8030
PUBLISHED: 2018-06-20
A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashes due to the defect. AMQP protocols 0-10 and 1.0 a...
CVE-2018-1117
PUBLISHED: 2018-06-20
ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log. In an environment where logs are shared with other parties, this cou...
CVE-2018-11701
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x005cb509, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11702
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00578cb3, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11703
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00402d6a, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.