Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

12/3/2020
12:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Netenrich Serves A La Carte SOC for Midmarket IT

SAN JOSE, Calif., December 3, 2020 — Netenrich, a Resolution Intelligence company, today announced the availability of its Intelligent SOC service to provide mid-market enterprises and managed service providers (MSPs) with choice, flexibility and scale to right-size cybersecurity investments as needs evolve. Netenrich Intelligent SOC (ISOC) removes the barriers and complexities associated with security operations by making it easier, effective and more cost-effective. Organiza-tions can scale their operations by adding outcomes-focused services that combine AIOps with a powerhouse of security analyst expertise.

“Organizations face a massive security struggle. CIOs and CISOs understand the importance of security yet they’re constrained across philosophical mindsets, lack of resources and skills shortage,” said Raju Chekuri, Chairman and CEO at Netenrich.

Mid-market IT and security teams run into agonizing challenges around the daily assault of threat alerts and analysis that overwhelms their processes, resources and budgets. They may lack security expertise or maturity to determine what actions to take, which issues are critical or how to resolve them.

CISOs also face internal debates whether to buy or build their own SOC. The choice to add managed security presents options as enterprises turn to traditional and well established outsourcers. For the mid-market, their full-service and long term contracts  are too costly and with many superfluous capabilities not needed.

“Netenrich Intelligent SOC offers pay-as-you-grow flexibility, easy onboarding and no investment risk. Organizations choose specific security services or entitlement layers with pricing and solutions that are right for them. We manage L1, L2 or other security workloads which frees internal teams to focus on high-priority and transformative activities tied to business needs,” said Brandon Hoffman, CISO at Netenrich.

“Over time we have built a resilient and agile SOC environment that continues to evolve,” said Dave Borman, Security Engineer at Sonesta Hotels. “We’re constantly evaluating new technologies and our existing tools to make sure they are the right solutions based on what we’re doing today and for the future. By adding outsourced services focused on the day-to-day tasks, it enabled our teams to concentrate on other priority initiatives, resulting in increased efficiencies.”

Netenrich ISOC also enables MSSPs, MSPs and VARs/Resellers to expand their businesses and increase recurring revenues from new, differentiated SOC services. For these partners, we offer a variety of service models including white label SOC or SOC services that can be sold to enterprises large and small. Netenrich ISOC integrates easily into existing security environments as well with industry-leading security analytics tools found in most enterprises. The services provide advanced enterprise security, AI-based SaaS solutions and an expert team of SOC analysts and threat researchers.

Netenrich ISOC service entitlements include workload offerings found in managed detection and response services and more:

  • Attack Surface Intelligence (ASI)
    External risk assessment – continuous scans across entire attack surface to minimize digital exposure, prioritize risks and remediate issues before they become incidents
  • Vulnerability assessments
  • Proprietary threat intelligence
  • Managed SIEM featuring IBM QRadar
  • Advance analytics
  • Endpoint detection and response

Netenrich ISOC leverages the company’s Resolution Intelligence architecture to deliver contextual, actionable and managed intelligence to reduce noise and false positives, prioritize critical threats, and speed up remediation.

“Security driven by our Resolution Intelligence means fewer escalations and outages today, and fewer alerts and incidents to chase tomorrow,” said Hoffman. “Over time, more incidents will get resolved automatically within Netenrich Intelligent SOC, reducing run costs even more and helping customers make the shift from a reactive to proactive security posture.”

Additional Resources

  • Netenrich Intelligent SOC overview
  • Netenrich Intelligent SOC e-book
  • SOConomics e-book
  • Netenrich Intelligent SOC promo video
  • Security experts video series
  • Customers and partners case studies

About Netenrich

Netenrich delivers complete Resolution Intelligence to transform digital operations into smarter business outcomes. With fifteen years’ innovation across IT, NetOps and SecOps, Netenrich applies a dynamic mix of machine and expert intelligence across a wide range of products and SaaS-based offerings. The solutions integrate with more than 140 market-leading IT and security applications to drive digital transformation, mitigate brand exposure, increase efficiencies, and bridge skills gaps. More than 6,000 customers and organizations worldwide rely on Netenrich to gain increased visibility and actionable intelligence across their IT and cloud networks. The company is privately owned and based in San Jose, CA.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22861
PUBLISHED: 2021-03-03
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted ...
CVE-2021-22862
PUBLISHED: 2021-03-03
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of ...
CVE-2021-22863
PUBLISHED: 2021-03-03
An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would b...
CVE-2020-10519
PUBLISHED: 2021-03-03
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the Gi...
CVE-2021-21353
PUBLISHED: 2021-03-03
Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was p...