Title: To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
1Netenrich SOC as-a-Servicea zero- intervention
platform for threat detection and response.
AI-driven, human-led.
2SOC and Business Alignment
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
3Why Not Aligned? Challenges
Skilled people Tooling Automation
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
4SOC Comes with SIEM Challenges
5SOCaaS Helping Security Evolve
STAGE 3
STAGE 4
- Mature asset assessment
- Asset prioritization
- Repeatable security framework
- Routine security engagements
- Improved metrics, reporting
- Basic security logging
- Mature IR plan with routine testing
- Proactive analysis of log data
- Automation for security operations
- Device and services hardening
- Mature runbook, process plan
- Real-time threat Intelligence
- Actionable recommendations
Customer maturity scale
6Unique Value Addresses Pain Points
Deep context w/ proprietary intel
Dedicated team of experts
Enhanced automated analysis
Built in models/use cases
Custom collector log retention
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
7SOCaaS Architecture
8(No Transcript)
9(No Transcript)
10(No Transcript)
11(No Transcript)
12(No Transcript)
13(No Transcript)
14(No Transcript)
15(No Transcript)
16(No Transcript)
17Netenrich SOC Technical Metrics
150 clients 5000 devices 30k EPS
100 Million Security Events Monitored Per Day
Filter Out Lower Priority Events
250,000
Correlate Criticality of Attacks
5,000
Advanced Correlation Content Threat Intelligence
25 - 50
2-5
Apply Content Rules SOC Analysts Investigate
18SOCaaS Enabling Your Team
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
19Cost vs Outcomes
20Realign with the Business
21Hotel Chain Operating 13,063 Rooms Across 80
Locations in 7 Countries
STANDARD SERVICE LEVEL MANAGED SECURITY
SERVICES
250Onboarded 250 devices in less than 15
business days
30Custom use cases built per customer needs
40Reduction in false positives by our AIOps
engine
Integrated with AWS and Azure native security
solutions
Integration with problem management workflows for
faster remediation
Ingested customers threat feeds into Netenrich
Security
22Lets Engage!
Thank you!
www.netenrich.com