Operations

3/7/2018
11:22 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions

Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.

SUNNYVALE, CA– March 7, 2018Arctic Wolf Networks, a leading security operations center (SOC)-as-a-service company, today announced that Trusource Labs, an Austin, Texas-based provider of corporate technical support services with a focus on IoT devices, has selected AWN CyberSOC™ to meet their growing cybersecurity needs. After careful consideration, Trusource decided the service’s turnkey threat detection and response capabilities were far superior to building a SOC internally. 

Trusource, which has experienced momentous growth since its founding in 2013, has sensitive client databases that house personally identifiable information (PII) for tens of thousands of individuals, creating a need for enhanced security to match their increased exposure. The busy IT team realized it needed more robust security operations and considered a security information and event management (SIEM) system that would provide complete visibility across its distributed IT infrastructure.  The team found a SIEM to be highly complex and required a dedicated team of security experts. 

After carefully evaluating the pros and cons of purchasing and deploying a SIEM for SOC capabilities, Trusource concluded that buying the AWN CyberSOC service was the right solution.  It provides a turnkey SOC-as-a-service and installs in minutes, combining the necessary people, process and technology for world class security operations. Trusource estimates that they were able to save up to 90 percent of what it would have cost to build it themselves.

“For organizations seeking a security operations center, Arctic Wolf’s AWN CyberSOC is the perfect solution. To do the equivalent internally would have cost us far more and taken many months,” said Larry Chapman, Trusource Labs IT Manager. “Arctic Wolf’s Concierge Security Engineer (CSE) acts as an extension of our IT team and provides a level of service that can only be described as incredible.”

In addition to the cost savings, AWN CyberSOC provides real-time insights and the benefit of Hybrid AI, a combination of machine learning and human expertise, so Trusource’s threats and security incidents can be quickly identified and receive an immediate response. The solution gives the IT team peace of mind by providing 10X better threat detection with 5X fewer false positives, a benefit that has already proven valuable for Trusource during a couple of phishing alerts that were immediately identified and remedied by AWN CyberSOC.

“Rapidly growing companies like Trusource should focus on their business and use SOC-as-a-service for advanced threat detection and response,” said Brian NeSmith, CEO and Co-Founder of Arctic Wolf Networks. “We excel at providing enterprise-class security operation centers for companies who do not have the expertise or multimillion-dollar budgets to throw at the problem.”

Trusource now has over 575 employees and a 24/7 international operations center in Limerick, Ireland. The customized compliance reporting it receives ensures that, with its expanding range of global clients, including those in the healthcare and financial services industries, industry regulations such as PCI, HIPAA and ISO 27001 are met or exceeded.

Additional Resources:

About Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response.  There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit https://www.arcticwolf.com.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I guess this answers the question: who's watching the watchers?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20050
PUBLISHED: 2018-12-10
Mishandling of an empty string on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via the ONVIF GetStreamUri method and GetVideoEncoderConfigurationOptions method.
CVE-2018-20051
PUBLISHED: 2018-12-10
Mishandling of '>' on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via certain ONVIF methods such as CreateUsers, SetImagingSettings, GetStreamUri, and so on.
CVE-2018-20029
PUBLISHED: 2018-12-10
The nxfs.sys driver in the DokanFS library 0.6.0 in NoMachine before 6.4.6 on Windows 10 allows local users to cause a denial of service (BSOD) because uninitialized memory can be read.
CVE-2018-1279
PUBLISHED: 2018-12-10
Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on ...
CVE-2018-15800
PUBLISHED: 2018-12-10
Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.