To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap? - PowerPoint PPT Presentation

About This Presentation
Title:

To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?

Description:

"With cybersecurity threats continuing to grow faster than security budgets, CISOs, CIOs and SecOps teams are left at a dangerous disadvantage. Even enterprises running their own Security Operations Centers (SOCs) find the perennial shortage of skills, tools, and other resources stops them from realizing the full value of investments. Rather than struggle to find – and hang on to – top talent with hands-on experience across network and cloud security, mid-sized enterprises are instead opting for SOC-as-a-Service offerings." Learn more: – PowerPoint PPT presentation

Number of Views:60
Updated: 24 May 2021
Slides: 23
Provided by: LukeVanderwall
Category:

less

Transcript and Presenter's Notes

Title: To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?


1
Netenrich SOC as-a-Servicea zero- intervention
platform for threat detection and response.
AI-driven, human-led.
2
SOC and Business Alignment
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
3
Why Not Aligned? Challenges
Skilled people Tooling Automation
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
4
SOC Comes with SIEM Challenges
 
 
5
SOCaaS Helping Security Evolve
STAGE 3
STAGE 4
  • Mature asset assessment
  • Asset prioritization
  • Repeatable security framework
  • Routine security engagements
  • Improved metrics, reporting
  • Basic security logging
  • Mature IR plan with routine testing
  • Proactive analysis of log data
  • Automation for security operations
  • Device and services hardening
  • Mature runbook, process plan
  • Real-time threat Intelligence
  • Actionable recommendations

Customer maturity scale
6
Unique Value Addresses Pain Points
Deep context w/ proprietary intel
Dedicated team of experts
Enhanced automated analysis
Built in models/use cases
Custom collector log retention
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
7
SOCaaS Architecture
8
(No Transcript)
9
(No Transcript)
10
(No Transcript)
11
(No Transcript)
12
(No Transcript)
13
(No Transcript)
14
(No Transcript)
15
(No Transcript)
16
(No Transcript)
17
Netenrich SOC Technical Metrics
150 clients 5000 devices 30k EPS
100 Million Security Events Monitored Per Day
Filter Out Lower Priority Events
250,000
Correlate Criticality of Attacks
5,000
Advanced Correlation Content Threat Intelligence
25 - 50
2-5
Apply Content Rules SOC Analysts Investigate
18
SOCaaS Enabling Your Team
Source Improving the Effectiveness of the
Security Operations Center, Ponemon Institute
2019,
19
Cost vs Outcomes
20
Realign with the Business
21
Hotel Chain Operating 13,063 Rooms Across 80
Locations in 7 Countries
STANDARD SERVICE LEVEL MANAGED SECURITY
SERVICES
250Onboarded 250 devices in less than 15
business days
30Custom use cases built per customer needs
40Reduction in false positives by our AIOps
engine
Integrated with AWS and Azure native security
solutions
Integration with problem management workflows for
faster remediation
Ingested customers threat feeds into Netenrich
Security
22
Lets Engage!
Thank you!
www.netenrich.com
Write a Comment
User Comments (0)
About PowerShow.com