Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

4/12/2019
10:50 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

8 'SOC-as-a-Service' Offerings

These new cloud services seek to help companies figure out what their traditional SIEM alerts mean, plus how they can prioritize responses and improve their security operations.
1 of 9

Image Source: Adobe Stock: tonsnoei

Image Source: Adobe Stock: tonsnoei

1 of 9
Comment  | 
Print  | 
Comments
Threaded  |  Newest First  |  Oldest First
AaronB633
50%
50%
AaronB633,
User Rank: Apprentice
4/15/2019 | 5:30:14 PM
SOC-as-a-Service is critical for mid-market
Glad to see SOC-as-a-Service highlighted as a practical solution for the masses that don't have the wherewithal to staff, resource, and retain an in-house SOC. It's also interesting to see the debate over the definition of this as a defined market. As a side effect of a fast-paced growing market, the phraseology of what's what is very nuanced. What's the difference between an MSSP, a co-managed SIEM, or a SOC-as-a-Service? Depends on who you ask. It would be interesting for sure to see a detailed and agreed-upon definition for each.

Vendors, such as ourselves, can easily see ourselves fitting all three of those categories. At Netsurion, we deliver what we call a co-managed SIEM. I would say that it easily aligns with the concept of a SOC-as-a-Service as well. It includes a fractional SOC team (EventTracker SOC) to fit the needs of the organization, that operates a SIEM platform (EventTracker SIEM) complete with managed security services like vulnerability assessment service, managed EDR (EventTracker EDR), and even managed threat deception service (EventTracker Honeynet) to name a few.

I think regardless of where you land on MSSP, co-managed SIEM, and SOC-as-a-Service markets, most would agree that more technology alone is not going to cut it for 90% of organizations with a security team of 1... or none. All of these solutions address the need for cybersecurity convergence, but are different in what degree do they provide product, people, and process to solve the problem. What layers of defense are within scope? How is it deployed and maintained? How are responsibilities aligned between vendor and customer? 
seven_stones
50%
50%
seven_stones,
User Rank: Apprentice
4/20/2019 | 2:09:36 PM
Re: SOC-as-a-Service is critical for mid-market
"Figure out what their traditional SIEM alerts mean"? The meaning is usually fairly clear from the default alert text. What the vast majority of organisations need is help with first configuring meaningful alerts (not just the defaults) and then how to respond to them - and this is only possible after gaining intimate knowledge of the environment. Is this part of the offering also? I doubt it because that wouldn't be economical - it does actually take time and skilled resource.

SIEM cannot be outsourced aside from the first level response of a SOC capability - and then only after the aforementioned use cases are configured and the capability is tuned - 18 months at least.

These services do little more than add to the problem.
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The security team seem to be taking SiegeWare seriously" 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.
CVE-2012-1592
PUBLISHED: 2019-12-05
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
CVE-2019-16770
PUBLISHED: 2019-12-05
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.
CVE-2019-19609
PUBLISHED: 2019-12-05
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.