11:22 AM
Dark Reading
Dark Reading
Products and Releases

Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions

Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.

SUNNYVALE, CA– March 7, 2018Arctic Wolf Networks, a leading security operations center (SOC)-as-a-service company, today announced that Trusource Labs, an Austin, Texas-based provider of corporate technical support services with a focus on IoT devices, has selected AWN CyberSOC™ to meet their growing cybersecurity needs. After careful consideration, Trusource decided the service’s turnkey threat detection and response capabilities were far superior to building a SOC internally. 

Trusource, which has experienced momentous growth since its founding in 2013, has sensitive client databases that house personally identifiable information (PII) for tens of thousands of individuals, creating a need for enhanced security to match their increased exposure. The busy IT team realized it needed more robust security operations and considered a security information and event management (SIEM) system that would provide complete visibility across its distributed IT infrastructure.  The team found a SIEM to be highly complex and required a dedicated team of security experts. 

After carefully evaluating the pros and cons of purchasing and deploying a SIEM for SOC capabilities, Trusource concluded that buying the AWN CyberSOC service was the right solution.  It provides a turnkey SOC-as-a-service and installs in minutes, combining the necessary people, process and technology for world class security operations. Trusource estimates that they were able to save up to 90 percent of what it would have cost to build it themselves.

“For organizations seeking a security operations center, Arctic Wolf’s AWN CyberSOC is the perfect solution. To do the equivalent internally would have cost us far more and taken many months,” said Larry Chapman, Trusource Labs IT Manager. “Arctic Wolf’s Concierge Security Engineer (CSE) acts as an extension of our IT team and provides a level of service that can only be described as incredible.”

In addition to the cost savings, AWN CyberSOC provides real-time insights and the benefit of Hybrid AI, a combination of machine learning and human expertise, so Trusource’s threats and security incidents can be quickly identified and receive an immediate response. The solution gives the IT team peace of mind by providing 10X better threat detection with 5X fewer false positives, a benefit that has already proven valuable for Trusource during a couple of phishing alerts that were immediately identified and remedied by AWN CyberSOC.

“Rapidly growing companies like Trusource should focus on their business and use SOC-as-a-service for advanced threat detection and response,” said Brian NeSmith, CEO and Co-Founder of Arctic Wolf Networks. “We excel at providing enterprise-class security operation centers for companies who do not have the expertise or multimillion-dollar budgets to throw at the problem.”

Trusource now has over 575 employees and a 24/7 international operations center in Limerick, Ireland. The customized compliance reporting it receives ensures that, with its expanding range of global clients, including those in the healthcare and financial services industries, industry regulations such as PCI, HIPAA and ISO 27001 are met or exceeded.

Additional Resources:

About Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response.  There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit https://www.arcticwolf.com.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
(ISC)2 Report: Glaring Disparity in Diversity for US Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
Voice-Operated Devices, Enterprise Security & the 'Big Truck' Attack
Menny Barzilay, Co-founder & CEO, FortyTwo Global,  3/15/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.