SlideShare a Scribd company logo
1 of 5
Download to read offline
SECURITY
OPERATIONS
CENTER
TO BUILD OR OUTSOURCE?
Rishikesh Kamat
Associate Vice President
Products & Services, Netmagic
Is your security strategy similar to the ‘whack-a-
mole’ game? Threats pop up in one hole and
once you’ve addressed them, they pop up
somewhere else. If so, how can your
organization shore up its defenses and build a
resilient security practice?
A Security Operations Center (SOC) helps
organizations stay abreast of the ever-changing
threat landscape while safeguarding them
against unauthorized malicious activity in real
time.
A SOC is made up of an organized and specialized
team that constantly monitors and bolsters the
security posture of an organization while
preventing, detecting, analyzing, and responding
to cyber security incidents. This is enabled with
the help of technology and well-articulated
processes and procedures. Built on the pillars of
people, process, and technology, a SOC is
evidently a prudent step that organizations can
take for maintaining a strong security posture.
If building a captive SOC is on your agenda, you
need to invest in specialized resources over a
long-term period, which means huge investments
in building up infrastructure and hiring specialists.
Hence, the bigger question organizations now face
is whether to build on their own or outsource it to
the experts with access to a deep and wide talent
pool in security.
BUILD OR OUTSOURCE
Most CIOs face this question for most of their IT decisions. However, the domain of security adds its
own layer of complexities when it boils down to such decision-making. Like most of the other
technology decisions, selecting the right model for SOC is no different. The decision to opt for any of
the SOC models – in-house, outsourced (as a Service) or hybrid – is a tough one.
Needless to say, it requires a well thought out strategy and a judicious planning. CIOs need to arrive
at a decision, keeping in mind their organization’s specific requirements.
Let’s understand what each decision entails.
IN-HOUSE SOC
An in-house SOC model is usually adopted by
organizations that have compliance issues with
respect to outsourcing or see outsourcing as a
perceived risk that could affect the integrity and
functioning of their business.
An immediate advantage of building your own SOC
is the realization of the expertise of your in-house
staff and the very fact that they know the
organization and its environment much better than
a third-party security service provider. They are
aware of the interdependencies between the
different departments and their requirements and
can address highly specific requirements
efficiently. To have a robust security infrastructure,
it is the responsibility of the CISO to hire a team of
experienced solutions architects, then build out an
operations team and deploy technology experts.
The downside to this approach is that the up-front
expenditure of building a SOC in-house is
considerably high as compared to an outsourced
or shared one. It will take years for an organization
to realize the RoI on the CapEx with respect to
licensing of SIEM tool, threat intelligence and
setting up the infrastructure. Moreover, finding
experienced SOC analysts or managers to man
the SOC will be difficult as these professionals
are not easy to find. Security is a domain where
constant knowledge sharing is one of the key
levers to successfully prevent attacks. A captive
SOC performs like an island in itself. Even if the
organization has been able to deploy the best of
people and technologies, the inability to connect
with a larger ecosystem can lead to a serious
knowledge gap.
That said, today, third party security providers are
engaging with organizations as consultants and
helping them build in-house SOC. These
consultants take care of the framework, technology
selection, process, and skill sets thus making a
captive SOC implementation easier.
However, any organization seeking to build its own
SOC from scratch must answer whether it has the
appropriate in-house skills and knowledge to man
and operate the SOC, to begin with.
1
OUTSOURCED SOC
Building an in-house SOC can prove to be a
cost-prohibitive proposition. It involves setting
up of the infrastructure grounds up. Besides,
hiring security experts to manage it can be an
onerous task. That’s primarily the reason an
organization considers taking the help of a
Managed Security Service Provider (MSSP).
In an MSSP model, the service provider provides
the infrastructure, intelligence and other
capabilities. An experienced service provider has
a state-of-the-art security infrastructure (core
competency) that provides rich threat intelligence
to detect real time sophisticated and targeted
attacks. They already have a team of trained and
experienced security analysts who are well
conversant with most of the security threats that an
organization may face. And, by the virtue of their
engagements with multiple clients, they are
equipped with state-of-the-art tools, as well as, a
sound knowledge about possible security threats
and incidents (both current and evolving). Hence,
the costs are lower than an in-house solution.
One of such progressive technology solutions is
Netmagic’s Comprehensive Network Attack
Monitoring (CNAM) tool, which is a real-time
monitoring solution that fortifies IT infrastructure
from security threats and vulnerabilities. It is a fully
managed SIEM solution with a SOC team that
manages the operations round the clock. Available
as a SaaS model, CNAM collates information from
multiple devices and applies intelligence to identify
suspicious activity across the spectrum. CNAM
allows for intelligent sharing
of threats across multiple customers without
divulging any customer specific information.
Besides CNAM, the Automated VAPT
(Vulnerability Assessment and Penetration
Testing) is a hybrid solution which blends
automated testing with security expert analysis.
This blended model provides the best quality
test coverage while accelerating the test time.
The unique technology identifies all possible
attack vectors.
Another important advantage of opting for an
MSSP is the time factor. Typically, an MSSP
takes a shorter time to get the SOC operational.
With the experience of working with multiple
clients, an MSSP is experienced to onboard
new clients and customizing the solution
offering quickly and reliably for their needs.
However, a concern with an outsourced SOC
model is that the log data and incident data are
stored with the MSSP. In a worst-case scenario,
this data can be lost or misplaced or misused.
Another concern related to an MSSP model is
the fact that a third-party is made aware of your
network’s vulnerabilities. Much depends on the
selection of a credible service provider, the non-
disclosure agreements that your organization
signs with the service provider, the architecture
of the tools deployed by the service provider
and well-defined Service Level Agreements
(SLAs) between you and the service provider.
If you choose to go for an MSSP model, there are a
few things that you should consider:
a. The reputation of the service provider for protecting critical assets and the ability to respond swiftly,
b. Technologies/tools/approaches to data protection and the level of security at their SOC, c. The
experience of the staff managing the SOC,
d. Background checks and any reference customers that you may speak with before signing on the
dotted line.
2
HYBRID SOC
In essence, a hybrid SOC is a combination of
the above two models. Under this model, the
organization, and the MSSP come together
and share synergies for technology, processes,
expertise, facilities and personnel resulting in
substantial cost savings. It is of utmost importance
in this kind of an arrangement is to have an overall
strategic plan for the operating model, define
roles that are tactically delivered by partners,
and build capabilities and maturity that leverage
the ecosystem. With MSSP, your security moves
beyond individual devices to being managed and
controlled from a centralized SOC.
Whether your organization is considering investing
in a SOC for the first time or seeking to evolve an
existing SOC infrastructure, the decision has to be
made factoring in all the elements. Choosing the
correct model to go for is not about implementing a
single solution but implementing the right solution
mix for your organization’s unique requirements.
The right choice will enable your organization
to address any security concerns (based on
correlated, contextual data), incidents and
breaches in a timely fashion. It also helps you stay
a step ahead with a stable and robust platform for
risk reduction.
And, it surely helps you experience peace of
mind, while enabling you to focus on your core
competencies.
3
About Netmagic (An NTT Communications Company)
Netmagic, an NTT Communications company, is India’s leading Managed
Hosting and Cloud Service Provider, with 9 carrier-neutral, state-of-the-art data
centers and serving more than 1500 enterprises globally. A pioneer in the
Indian IT Infrastructure services space - it was the first to launch services such
as Cloud Computing, Managed Security, Disaster Recovery-as-a-Service and
Software-Defined Storage. Netmagic also delivers Remote Infrastructure
Management services to NTT Communications’ customers across Americas,
Europe and Asia-Pacific region.
Netmagic is India’s only IT Infrastructure services provider to be PCI DSS
certified for its entire suite of services. It is also the first cloud service provider in
India and in the world, to receive the CSA STAR certification for Cloud
Capability Maturity Model (CCM) version 3.0.1, an industry benchmark for the
specific security requirements of multi-tenant service providers. Besides this,
Netmagic is also empanelled as an IT Security Auditing Organization with
CERT-In (Indian Computer Emergency Response Team).
Netmagic was chosen by India’s CIO community for 6 awards at the recent
CIO Choice Awards 2016, across categories for Data Center and Cloud
services. Prior to that, it was awarded the ‘Data Center Service Provider of
the Year’ and ‘Infrastructure as a Service Provider of the Year’ by Frost &
Sullivan at India ICT Awards 2015. Netmagic was also mentioned in
Gartner’s 2015 Magic Quadrant Report for Cloud-Enabled Managed
Hosting, Asia/ Pacific, where NTT Communications was named in the
Leader quadrant. The mention was a result of the analyst firm’s
assessment of NTT Communications’ Cloud services portfolio, which
included Netmagic’s Cloud services.
To learn more, visit us at: www.netmagicsolutions.com
Netmagic is committed to providing world-class and customized IT Infrastructure solutions
that enable our customers to ‘Rethink’ the way they configure IT.
DATA CENTER SERVICES CLOUD SERVICES INFRASTRUCTURE APPLICATION
• Colocation • Bandwidth • IaaS-based Public / Private / Hybrid Cloud • Exchange • Linux Email
• Remote Hand Support • DR On Cloud • Object / Performance • SAP Basis • Middleware
• Tiered Storage (NTSS) • DBaaS
HOSTED IT INFRASTRUCTURE MANAGED SERVICES NETWORK SERVICES
• Dedicated Hosting • Pre-provisioned Servers • 24x7 Infrastructure Monitoring • Domestic MPLS/IP VPN
• Managed Firewall • Load Balancing and Management of OS, DB, Network and App • Domestic NFV based services
• Backup And Storage • Disaster Recovery • WebControl • CNAM and VAPT • ILD - VPN, Internet
• DRaaS • Data Center Consolidation • Remote DC Management • SecureAT
• Data Center Migration • MDDoS • SOC • SSL Certification
• Managed IPS/UTM
The 2016 Frost & Sullivan India ICT Awards CIO Choice Awards 2017
Public Cloud | Private Cloud | Hybrid Cloud
‘Infrastructure as a Service Provider of the Year’ Data Center Managed Services Provider | Disaster Recovery as a Service
marketing@netmagicsolutions.com | www.netmagicsolutions.com FOR FURTHER DETAILS PLEASE CONTACT
Twitter: @netmagic | LinkedIn: @Netmagic Solutions | YouTube: Netmagic Solutions
1800 103 3130Facebook: Netmagic Solutions

More Related Content

What's hot

AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0Happiest Minds Technologies
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
Whitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcingWhitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcingRaghuraman Ramamurthy
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1pk4
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
MSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListMSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListSiemplify
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationSiemplify
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 

What's hot (18)

AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Whitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcingWhitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcing
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1Ea Relationship To Security And The Enterprise V1
Ea Relationship To Security And The Enterprise V1
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
17 domains
17 domains17 domains
17 domains
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
MSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListMSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping List
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 

Similar to Security operations center inhouse vs outsource

Revolutionize Your Security Strategy with White Label SOC Service
Revolutionize Your Security Strategy with White Label SOC ServiceRevolutionize Your Security Strategy with White Label SOC Service
Revolutionize Your Security Strategy with White Label SOC ServiceSingle Point of Contact
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
All About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxAll About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxMetaorange
 
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfAll About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfMetaorange
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516Tony Evans
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
SOAR Platform
SOAR PlatformSOAR Platform
SOAR PlatformSecuraa
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 

Similar to Security operations center inhouse vs outsource (20)

SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Revolutionize Your Security Strategy with White Label SOC Service
Revolutionize Your Security Strategy with White Label SOC ServiceRevolutionize Your Security Strategy with White Label SOC Service
Revolutionize Your Security Strategy with White Label SOC Service
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
SOC Models Comparison
SOC Models ComparisonSOC Models Comparison
SOC Models Comparison
 
All About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxAll About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptx
 
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfAll About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdf
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516
 
Cybersecurity automation
Cybersecurity automationCybersecurity automation
Cybersecurity automation
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
SOAR Platform
SOAR PlatformSOAR Platform
SOAR Platform
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 

Recently uploaded

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 

Recently uploaded (20)

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 

Security operations center inhouse vs outsource

  • 1. SECURITY OPERATIONS CENTER TO BUILD OR OUTSOURCE? Rishikesh Kamat Associate Vice President Products & Services, Netmagic
  • 2. Is your security strategy similar to the ‘whack-a- mole’ game? Threats pop up in one hole and once you’ve addressed them, they pop up somewhere else. If so, how can your organization shore up its defenses and build a resilient security practice? A Security Operations Center (SOC) helps organizations stay abreast of the ever-changing threat landscape while safeguarding them against unauthorized malicious activity in real time. A SOC is made up of an organized and specialized team that constantly monitors and bolsters the security posture of an organization while preventing, detecting, analyzing, and responding to cyber security incidents. This is enabled with the help of technology and well-articulated processes and procedures. Built on the pillars of people, process, and technology, a SOC is evidently a prudent step that organizations can take for maintaining a strong security posture. If building a captive SOC is on your agenda, you need to invest in specialized resources over a long-term period, which means huge investments in building up infrastructure and hiring specialists. Hence, the bigger question organizations now face is whether to build on their own or outsource it to the experts with access to a deep and wide talent pool in security. BUILD OR OUTSOURCE Most CIOs face this question for most of their IT decisions. However, the domain of security adds its own layer of complexities when it boils down to such decision-making. Like most of the other technology decisions, selecting the right model for SOC is no different. The decision to opt for any of the SOC models – in-house, outsourced (as a Service) or hybrid – is a tough one. Needless to say, it requires a well thought out strategy and a judicious planning. CIOs need to arrive at a decision, keeping in mind their organization’s specific requirements. Let’s understand what each decision entails. IN-HOUSE SOC An in-house SOC model is usually adopted by organizations that have compliance issues with respect to outsourcing or see outsourcing as a perceived risk that could affect the integrity and functioning of their business. An immediate advantage of building your own SOC is the realization of the expertise of your in-house staff and the very fact that they know the organization and its environment much better than a third-party security service provider. They are aware of the interdependencies between the different departments and their requirements and can address highly specific requirements efficiently. To have a robust security infrastructure, it is the responsibility of the CISO to hire a team of experienced solutions architects, then build out an operations team and deploy technology experts. The downside to this approach is that the up-front expenditure of building a SOC in-house is considerably high as compared to an outsourced or shared one. It will take years for an organization to realize the RoI on the CapEx with respect to licensing of SIEM tool, threat intelligence and setting up the infrastructure. Moreover, finding experienced SOC analysts or managers to man the SOC will be difficult as these professionals are not easy to find. Security is a domain where constant knowledge sharing is one of the key levers to successfully prevent attacks. A captive SOC performs like an island in itself. Even if the organization has been able to deploy the best of people and technologies, the inability to connect with a larger ecosystem can lead to a serious knowledge gap. That said, today, third party security providers are engaging with organizations as consultants and helping them build in-house SOC. These consultants take care of the framework, technology selection, process, and skill sets thus making a captive SOC implementation easier. However, any organization seeking to build its own SOC from scratch must answer whether it has the appropriate in-house skills and knowledge to man and operate the SOC, to begin with. 1
  • 3. OUTSOURCED SOC Building an in-house SOC can prove to be a cost-prohibitive proposition. It involves setting up of the infrastructure grounds up. Besides, hiring security experts to manage it can be an onerous task. That’s primarily the reason an organization considers taking the help of a Managed Security Service Provider (MSSP). In an MSSP model, the service provider provides the infrastructure, intelligence and other capabilities. An experienced service provider has a state-of-the-art security infrastructure (core competency) that provides rich threat intelligence to detect real time sophisticated and targeted attacks. They already have a team of trained and experienced security analysts who are well conversant with most of the security threats that an organization may face. And, by the virtue of their engagements with multiple clients, they are equipped with state-of-the-art tools, as well as, a sound knowledge about possible security threats and incidents (both current and evolving). Hence, the costs are lower than an in-house solution. One of such progressive technology solutions is Netmagic’s Comprehensive Network Attack Monitoring (CNAM) tool, which is a real-time monitoring solution that fortifies IT infrastructure from security threats and vulnerabilities. It is a fully managed SIEM solution with a SOC team that manages the operations round the clock. Available as a SaaS model, CNAM collates information from multiple devices and applies intelligence to identify suspicious activity across the spectrum. CNAM allows for intelligent sharing of threats across multiple customers without divulging any customer specific information. Besides CNAM, the Automated VAPT (Vulnerability Assessment and Penetration Testing) is a hybrid solution which blends automated testing with security expert analysis. This blended model provides the best quality test coverage while accelerating the test time. The unique technology identifies all possible attack vectors. Another important advantage of opting for an MSSP is the time factor. Typically, an MSSP takes a shorter time to get the SOC operational. With the experience of working with multiple clients, an MSSP is experienced to onboard new clients and customizing the solution offering quickly and reliably for their needs. However, a concern with an outsourced SOC model is that the log data and incident data are stored with the MSSP. In a worst-case scenario, this data can be lost or misplaced or misused. Another concern related to an MSSP model is the fact that a third-party is made aware of your network’s vulnerabilities. Much depends on the selection of a credible service provider, the non- disclosure agreements that your organization signs with the service provider, the architecture of the tools deployed by the service provider and well-defined Service Level Agreements (SLAs) between you and the service provider. If you choose to go for an MSSP model, there are a few things that you should consider: a. The reputation of the service provider for protecting critical assets and the ability to respond swiftly, b. Technologies/tools/approaches to data protection and the level of security at their SOC, c. The experience of the staff managing the SOC, d. Background checks and any reference customers that you may speak with before signing on the dotted line. 2
  • 4. HYBRID SOC In essence, a hybrid SOC is a combination of the above two models. Under this model, the organization, and the MSSP come together and share synergies for technology, processes, expertise, facilities and personnel resulting in substantial cost savings. It is of utmost importance in this kind of an arrangement is to have an overall strategic plan for the operating model, define roles that are tactically delivered by partners, and build capabilities and maturity that leverage the ecosystem. With MSSP, your security moves beyond individual devices to being managed and controlled from a centralized SOC. Whether your organization is considering investing in a SOC for the first time or seeking to evolve an existing SOC infrastructure, the decision has to be made factoring in all the elements. Choosing the correct model to go for is not about implementing a single solution but implementing the right solution mix for your organization’s unique requirements. The right choice will enable your organization to address any security concerns (based on correlated, contextual data), incidents and breaches in a timely fashion. It also helps you stay a step ahead with a stable and robust platform for risk reduction. And, it surely helps you experience peace of mind, while enabling you to focus on your core competencies. 3
  • 5. About Netmagic (An NTT Communications Company) Netmagic, an NTT Communications company, is India’s leading Managed Hosting and Cloud Service Provider, with 9 carrier-neutral, state-of-the-art data centers and serving more than 1500 enterprises globally. A pioneer in the Indian IT Infrastructure services space - it was the first to launch services such as Cloud Computing, Managed Security, Disaster Recovery-as-a-Service and Software-Defined Storage. Netmagic also delivers Remote Infrastructure Management services to NTT Communications’ customers across Americas, Europe and Asia-Pacific region. Netmagic is India’s only IT Infrastructure services provider to be PCI DSS certified for its entire suite of services. It is also the first cloud service provider in India and in the world, to receive the CSA STAR certification for Cloud Capability Maturity Model (CCM) version 3.0.1, an industry benchmark for the specific security requirements of multi-tenant service providers. Besides this, Netmagic is also empanelled as an IT Security Auditing Organization with CERT-In (Indian Computer Emergency Response Team). Netmagic was chosen by India’s CIO community for 6 awards at the recent CIO Choice Awards 2016, across categories for Data Center and Cloud services. Prior to that, it was awarded the ‘Data Center Service Provider of the Year’ and ‘Infrastructure as a Service Provider of the Year’ by Frost & Sullivan at India ICT Awards 2015. Netmagic was also mentioned in Gartner’s 2015 Magic Quadrant Report for Cloud-Enabled Managed Hosting, Asia/ Pacific, where NTT Communications was named in the Leader quadrant. The mention was a result of the analyst firm’s assessment of NTT Communications’ Cloud services portfolio, which included Netmagic’s Cloud services. To learn more, visit us at: www.netmagicsolutions.com Netmagic is committed to providing world-class and customized IT Infrastructure solutions that enable our customers to ‘Rethink’ the way they configure IT. DATA CENTER SERVICES CLOUD SERVICES INFRASTRUCTURE APPLICATION • Colocation • Bandwidth • IaaS-based Public / Private / Hybrid Cloud • Exchange • Linux Email • Remote Hand Support • DR On Cloud • Object / Performance • SAP Basis • Middleware • Tiered Storage (NTSS) • DBaaS HOSTED IT INFRASTRUCTURE MANAGED SERVICES NETWORK SERVICES • Dedicated Hosting • Pre-provisioned Servers • 24x7 Infrastructure Monitoring • Domestic MPLS/IP VPN • Managed Firewall • Load Balancing and Management of OS, DB, Network and App • Domestic NFV based services • Backup And Storage • Disaster Recovery • WebControl • CNAM and VAPT • ILD - VPN, Internet • DRaaS • Data Center Consolidation • Remote DC Management • SecureAT • Data Center Migration • MDDoS • SOC • SSL Certification • Managed IPS/UTM The 2016 Frost & Sullivan India ICT Awards CIO Choice Awards 2017 Public Cloud | Private Cloud | Hybrid Cloud ‘Infrastructure as a Service Provider of the Year’ Data Center Managed Services Provider | Disaster Recovery as a Service marketing@netmagicsolutions.com | www.netmagicsolutions.com FOR FURTHER DETAILS PLEASE CONTACT Twitter: @netmagic | LinkedIn: @Netmagic Solutions | YouTube: Netmagic Solutions 1800 103 3130Facebook: Netmagic Solutions