The Ultimate Guide to Security Operations Centre
2024 edition
Overview
Also known as SOC.
Generally operated by larger organisations or as a shared service provided by a Managed Services Provider, the Security Operations Centre is a centralized function handling information security issues, challenges, protective measures, and intelligence. The SOC is tasked with managing and maintaining organisational security posture, and typically addresses the issue from the three related factors of people, process and technology, a combination of which is essential for appropriate cybersecurity risk mitigation.
Analyst reports
IDC MarketScape on SOC & Ransomware
Canadian ISA Cybersecurity launches first UK operation ...
Thu, 28th Mar 2024
IDC on SOC & Cloud Services
Vectra AI & Gigamon partner for hybrid cloud security s...
Fri, 23rd Feb 2024
Frost & Sullivan on SOC & MSSP
Viettel Cyber Security named top cybersecurity firm
Tue, 9th Jan 2024
Forrester Research on SOC & WFH
Dynatrace enhances defence against hybrid workplace thr...
Wed, 9th Aug 2023
Expert columns
By Adam Khan of Barracuda XDR
How attackers target security blind spots: Three real-l...
Last month
By George Moawad of Genetec
How to converge physical security and IT to better prot...
Fri, 29th Mar 2024
By Andrew Smith of Lumify Work, New Zealand
Increasing cyber resilience through CISM training in NZ
Mon, 12th Feb 2024
By Shane Buckley of Gigamon
Why 2024 is the year of scaling security efficiencies
Thu, 8th Feb 2024
By Sharon Shitrit of Radware
Why traditional rate limiting falls short against today...
Thu, 8th Feb 2024
More expert columns
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Mon, 5th Feb 2024
By Jaya Baloo of Rapid7
How CISOs’ roles – and security operations – will chang...
Mon, 22nd Jan 2024
By Scott Goodwin of DigitalXRAID
Boardroom preparedness: The best security strategy for ...
Tue, 19th Dec 2023
By Tim O’Neill of BitTitan
Why it’s vital to take a holistic approach to cybersecu...
Tue, 17th Oct 2023
By Chris Fisher of Vectra AI, APJ
Preventing security professionals from ‘quietly quittin...
Thu, 28th Sep 2023
By Craig Jones of Ontinue
Navigating the security operations center maze
Fri, 21st Jul 2023
Recent news
About Small Business
ConnectWise integrates with Microsoft Defender to suppo...
2 days ago
About IT Training
Acumen expands partnerships to bolster cyber security s...
Last week
About Cyber attacks
BeyondTrust lauded as a leader in Identity Threat Detec...
Last week
About Malware
Picus Security unveils AI assistant for improved cyber ...
Last month
About Firewall
Brisbane Catholic Education deploys Check Point's Quant...
Last month
More news
About Security intelligence
LogRhythm's Axon revolutionises security updates with l...
Last month
About Collaboration
Tufin collaborates with Microsoft on AI-driven security...
Last month
About Security management
SecurityBridge unveils advanced platform for enhanced S...
Last month
About Chief Technology Officer
Logicalis Australia acquires Microsoft's MXDR partner s...
Wed, 27th Mar 2024
About Cyber Threats
Check Point & Microsoft collaborate to boost AI cyberse...
Wed, 27th Mar 2024
Even more news
About Customer Experience
Keeper Security enhances UI & introduces new onboarding...
Thu, 21st Mar 2024
About Collaboration
Cato Networks introduces 'network stories' for seamless...
Wed, 20th Mar 2024
About Firewall
Tesserent Academy partners Toorak College for girls' cy...
Fri, 15th Mar 2024
About Firewall
Tesserent Academy trials cybersecurity sessions
Fri, 15th Mar 2024
About Software-as-a-Service
Genetec unveils Security Center SaaS: a leap in physica...
Mon, 11th Mar 2024
Job moves
Move at NormCyber
NormCyber beefs up executive team to boost European exp...
Thu, 7th Mar 2024
Move at Intersec
Exabeam appoints Steve Wilson as Chief Product Officer ...
Thu, 16th Nov 2023
Move at University of Waikato
Kordia Group appoints Joshua Reedy as new CISO
Thu, 16th Mar 2023
Move at Gartner
LogRhythm appoints Michael Bovalino as Country Manager
Fri, 18th Mar 2022
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Security Information and Event Management, Firewall, and Network Security.
Powered by