Operations

3/7/2018
11:22 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions

Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.

SUNNYVALE, CA– March 7, 2018Arctic Wolf Networks, a leading security operations center (SOC)-as-a-service company, today announced that Trusource Labs, an Austin, Texas-based provider of corporate technical support services with a focus on IoT devices, has selected AWN CyberSOC™ to meet their growing cybersecurity needs. After careful consideration, Trusource decided the service’s turnkey threat detection and response capabilities were far superior to building a SOC internally. 

Trusource, which has experienced momentous growth since its founding in 2013, has sensitive client databases that house personally identifiable information (PII) for tens of thousands of individuals, creating a need for enhanced security to match their increased exposure. The busy IT team realized it needed more robust security operations and considered a security information and event management (SIEM) system that would provide complete visibility across its distributed IT infrastructure.  The team found a SIEM to be highly complex and required a dedicated team of security experts. 

After carefully evaluating the pros and cons of purchasing and deploying a SIEM for SOC capabilities, Trusource concluded that buying the AWN CyberSOC service was the right solution.  It provides a turnkey SOC-as-a-service and installs in minutes, combining the necessary people, process and technology for world class security operations. Trusource estimates that they were able to save up to 90 percent of what it would have cost to build it themselves.

“For organizations seeking a security operations center, Arctic Wolf’s AWN CyberSOC is the perfect solution. To do the equivalent internally would have cost us far more and taken many months,” said Larry Chapman, Trusource Labs IT Manager. “Arctic Wolf’s Concierge Security Engineer (CSE) acts as an extension of our IT team and provides a level of service that can only be described as incredible.”

In addition to the cost savings, AWN CyberSOC provides real-time insights and the benefit of Hybrid AI, a combination of machine learning and human expertise, so Trusource’s threats and security incidents can be quickly identified and receive an immediate response. The solution gives the IT team peace of mind by providing 10X better threat detection with 5X fewer false positives, a benefit that has already proven valuable for Trusource during a couple of phishing alerts that were immediately identified and remedied by AWN CyberSOC.

“Rapidly growing companies like Trusource should focus on their business and use SOC-as-a-service for advanced threat detection and response,” said Brian NeSmith, CEO and Co-Founder of Arctic Wolf Networks. “We excel at providing enterprise-class security operation centers for companies who do not have the expertise or multimillion-dollar budgets to throw at the problem.”

Trusource now has over 575 employees and a 24/7 international operations center in Limerick, Ireland. The customized compliance reporting it receives ensures that, with its expanding range of global clients, including those in the healthcare and financial services industries, industry regulations such as PCI, HIPAA and ISO 27001 are met or exceeded.

Additional Resources:

About Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response.  There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit https://www.arcticwolf.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-13435
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method to disable passcode authentication. NOTE: the vendor indicates that this is not an attack of interest w...
CVE-2018-13446
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.1 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. ...
CVE-2018-14567
PUBLISHED: 2018-08-16
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
CVE-2018-15122
PUBLISHED: 2018-08-16
An issue found in Progress Telerik JustAssembly through 2018.1.323.2 and JustDecompile through 2018.2.605.0 makes it possible to execute code by decompiling a compiled .NET object (such as DLL or EXE) with an embedded resource file by clicking on the resource.
CVE-2018-11509
PUBLISHED: 2018-08-16
ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository. This may allow an attacker to login and upload a webshell.