Operations

3/7/2018
11:22 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions

Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.

SUNNYVALE, CA– March 7, 2018Arctic Wolf Networks, a leading security operations center (SOC)-as-a-service company, today announced that Trusource Labs, an Austin, Texas-based provider of corporate technical support services with a focus on IoT devices, has selected AWN CyberSOC™ to meet their growing cybersecurity needs. After careful consideration, Trusource decided the service’s turnkey threat detection and response capabilities were far superior to building a SOC internally. 

Trusource, which has experienced momentous growth since its founding in 2013, has sensitive client databases that house personally identifiable information (PII) for tens of thousands of individuals, creating a need for enhanced security to match their increased exposure. The busy IT team realized it needed more robust security operations and considered a security information and event management (SIEM) system that would provide complete visibility across its distributed IT infrastructure.  The team found a SIEM to be highly complex and required a dedicated team of security experts. 

After carefully evaluating the pros and cons of purchasing and deploying a SIEM for SOC capabilities, Trusource concluded that buying the AWN CyberSOC service was the right solution.  It provides a turnkey SOC-as-a-service and installs in minutes, combining the necessary people, process and technology for world class security operations. Trusource estimates that they were able to save up to 90 percent of what it would have cost to build it themselves.

“For organizations seeking a security operations center, Arctic Wolf’s AWN CyberSOC is the perfect solution. To do the equivalent internally would have cost us far more and taken many months,” said Larry Chapman, Trusource Labs IT Manager. “Arctic Wolf’s Concierge Security Engineer (CSE) acts as an extension of our IT team and provides a level of service that can only be described as incredible.”

In addition to the cost savings, AWN CyberSOC provides real-time insights and the benefit of Hybrid AI, a combination of machine learning and human expertise, so Trusource’s threats and security incidents can be quickly identified and receive an immediate response. The solution gives the IT team peace of mind by providing 10X better threat detection with 5X fewer false positives, a benefit that has already proven valuable for Trusource during a couple of phishing alerts that were immediately identified and remedied by AWN CyberSOC.

“Rapidly growing companies like Trusource should focus on their business and use SOC-as-a-service for advanced threat detection and response,” said Brian NeSmith, CEO and Co-Founder of Arctic Wolf Networks. “We excel at providing enterprise-class security operation centers for companies who do not have the expertise or multimillion-dollar budgets to throw at the problem.”

Trusource now has over 575 employees and a 24/7 international operations center in Limerick, Ireland. The customized compliance reporting it receives ensures that, with its expanding range of global clients, including those in the healthcare and financial services industries, industry regulations such as PCI, HIPAA and ISO 27001 are met or exceeded.

Additional Resources:

About Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response.  There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit https://www.arcticwolf.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20031
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2018-20032
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon t...
CVE-2018-20034
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2019-3855
PUBLISHED: 2019-03-21
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
CVE-2019-3858
PUBLISHED: 2019-03-21
An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.