SlideShare a Scribd company logo
Netenrich SOC as-a-Service
a zero- intervention platform for threat detection and
response.
AI-driven, human-led.
©2020 Netenrich, Inc. All rights reserved.
SOC and Business Alignment
©2020 Netenrich, Inc. All rights reserved. 2
Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
Why Not Aligned? Challenges
Private and confidential © Netenrich, Inc. 3
Skilled people
Tooling
Automation
Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
SOC Comes with SIEM Challenges
Private and confidential © Netenrich, Inc. 4
A good security analyst can investigate
15 suspicious alerts per
day
to discover 1 or 2 actionable alerts per shift
 Throwing people at alert volume = a high
ops cost
 Alert fatigue
 Strained Security Ops
PEOPLE
Base use cases create a flood of alerts with
1,000+ suspicious
events
per 50M log events per day
 Lacking context
 Emerging threats go undetected
 Event investigation workflows are largely
manual
PROCES
S
An average enterprise uses
32 different security
vendors
 Siloed products
 Teams lack real time threat intel
 Multi-vendor environment makes
compliance complicated
TECHNOLOG
Y
SOCaaS Helping Security Evolve
Private and confidential © Netenrich, Inc. 5
STAGE 3
 Mature asset assessment
 Asset prioritization
 Repeatable security
framework
 Routine security
engagements
 Improved metrics, reporting
 Basic security logging
STAGE 4
 Mature IR plan with routine testing
 Proactive analysis of log data
 Automation for security operations
 Device and services hardening
 Mature runbook, process plan
 Real-time threat Intelligence
 Actionable recommendations
Customer maturity scale
24 X 7 security
monitoring
24 X 7 incident escalation with
remediation guidelines
Threat
intelligence
Compliance
reporting
Network flow behavior
analytics
User behavior
analytics
Insider threat
monitoring
Log management – 1
year
External security
assessments
Vulnerability
assessments
Web application
scanning
PCI DSS ASV
scanning
Penetration
testing
STAGE 1
 Reactive culture
 Product-based solutions
 Focus on simple perimeter
defense
 No visibility
 Absence of KB, metrics,
reporting
 Project backlog
STAGE 2
 Additional Tools (IDS/IPS,
AV) for detection and
prevention
 Basic reporting, visibility
 Creation of security policies
Services Delivered
Unique Value Addresses Pain Points
©2020 Netenrich, Inc. All rights reserved. 6
Deep context
w/ proprietary
intel
Dedicated
team of
experts
Enhanced
automated
analysis
Built in
models/use
cases
Custom
collector &
log retention
Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
SOCaaS Architecture
Private and confidential © Netenrich, Inc. 7
Netenrich Security PlatformSIEM set-up
Level 2: Threat intel on in-built QRadar alerts
 24 X 7 security monitoring and incident
response
 Skilled SOC Analysts
 Threat intelligence
 Standardized Delivery Model
 Custom Dashboard & Widgets
 Tailored Reporting + Alerts
 Periodic Maturity Assessments
Qualified security incidents with
remediation guidelines
CSIRT
PROBLEM
SOLVERS
Custom Built Log Collector
 Custom Shipper
 Extended Security Monitoring
 Provides EPS Reduction
 Proprietary Connectors
 Rapid Onboarding Framework
 Direct ingestion of Logs to Cloud collectors
IP enhanced IBM QRadar implementation
 Proprietary Integration
 AI Based Analysis & Filtering
 Custom Business Context Use cases
 AI Augmented Actionable Alerts
 False Positive Reduction
 Log Retention
2 way - Incident
Automation
SinglePaneofGlasswithStandardizedDashboard
Level 1: Eradication of false positives
On-prem | Cloud | Custom Application Support
Netenrich SOC
Client’s ITSM solution
©2020 Netenrich, Inc. All rights reserved. 8
©2020 Netenrich, Inc. All rights reserved. 9
©2020 Netenrich, Inc. All rights reserved. 10
©2020 Netenrich, Inc. All rights reserved. 11
©2020 Netenrich, Inc. All rights reserved. 12
©2020 Netenrich, Inc. All rights reserved. 13
©2020 Netenrich, Inc. All rights reserved. 14
©2020 Netenrich, Inc. All rights reserved. 15
©2020 Netenrich, Inc. All rights reserved. 16
150+ clients
5000+ devices
30k+ EPS
SUSPICIOUS EVENTS
Low Level Alerts- e.g.: Port Scan
ACTIONABLE SECURITY EVENTS PER DAY
Very High-Level Alerts Investigated by SOC Analyst
EVENTS THAT TRIGGER REVIEW
High-Level Alerts- SOC Analyst
ATTACKS FROM ABUSIVE ATTACKERS
Mid-Level Alerts Correlated with Database
Filter Out Lower
Priority Events
Correlate Criticality
of Attacks
Advanced Correlation Content
& Threat Intelligence
Apply Content Rules &
SOC Analysts Investigate
250,000
5,000
25 - 50
2-5
100 Million Security Events
Monitored Per Day
Netenrich SOC – Technical Metrics
SOCaaS Enabling Your Team
©2020 Netenrich, Inc. All rights reserved. 18
Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
Cost vs Outcomes
©2020 Netenrich, Inc. All rights reserved. 19
Requirements
40% reduction in EPS
50% faster onboarding
35% reduction in SOC cost
Enhanced detection
Elastic consumption (data
management)
Only contract the business
outcomes you need
Realign with the Business
©2020 Netenrich, Inc. All rights reserved. 20
Enable your people
Bridge skills gaps
Decrease risk while reducing cost
Optimize consumption
Drive outcomes
Hotel Chain Operating 13,063 Rooms Across 80
Locations in 7 Countries
Private and confidential © Netenrich, Inc. 21
STANDARD SERVICE LEVEL | MANAGED SECURITY SERVICES
250+Onboarded 250+ devices in
less than 15 business days
30+Custom use cases built per
customer needs
40%Reduction in false positives by
our AIOps engine
Integrated with AWS and
Azure native security solutions
Ingested customers’ threat
feeds into Netenrich Security
Integration with problem
management workflows for
faster remediation
Let’s Engage!
©2020 Netenrich, Inc. All rights reserved. 22
Thank you!Our Cybersec Strength
• 150+ Managed Security
Services customers
• 100+ best-in-class security
specialists
• 60+ R&D folks for Security
products
• 3 global delivery centers
www.netenrich.com

More Related Content

What's hot

Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
ShivamSharma909
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
DelforChacnCornejo
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
Security operation center
Security operation centerSecurity operation center
Security operation center
MuthuKumaran267
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
Sameer Paradia
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
Nozomi Networks
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
MohanPandey31
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Security architecture
Security architectureSecurity architecture
Security architecture
Duncan Unwin
 

What's hot (20)

Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Security architecture
Security architectureSecurity architecture
Security architecture
 

Similar to To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?

Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
MarketingArrowECS_CZ
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
Splunk
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
Panda Security
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
Richard (Rich) A. Cassario
 
ASPEN Brochure
ASPEN BrochureASPEN Brochure
ASPEN Brochure
Florin Hoinarescu
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
IBM Security
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
Splunk
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Prime Infoserv
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
African Cyber Security Summit
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Case IQ
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
Marco Casassa Mont
 

Similar to To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap? (20)

Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
ASPEN Brochure
ASPEN BrochureASPEN Brochure
ASPEN Brochure
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Security Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-ServiceSecurity Analytics & Security Intelligence-as-a-Service
Security Analytics & Security Intelligence-as-a-Service
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?

  • 1. Netenrich SOC as-a-Service a zero- intervention platform for threat detection and response. AI-driven, human-led. ©2020 Netenrich, Inc. All rights reserved.
  • 2. SOC and Business Alignment ©2020 Netenrich, Inc. All rights reserved. 2 Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
  • 3. Why Not Aligned? Challenges Private and confidential © Netenrich, Inc. 3 Skilled people Tooling Automation Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
  • 4. SOC Comes with SIEM Challenges Private and confidential © Netenrich, Inc. 4 A good security analyst can investigate 15 suspicious alerts per day to discover 1 or 2 actionable alerts per shift  Throwing people at alert volume = a high ops cost  Alert fatigue  Strained Security Ops PEOPLE Base use cases create a flood of alerts with 1,000+ suspicious events per 50M log events per day  Lacking context  Emerging threats go undetected  Event investigation workflows are largely manual PROCES S An average enterprise uses 32 different security vendors  Siloed products  Teams lack real time threat intel  Multi-vendor environment makes compliance complicated TECHNOLOG Y
  • 5. SOCaaS Helping Security Evolve Private and confidential © Netenrich, Inc. 5 STAGE 3  Mature asset assessment  Asset prioritization  Repeatable security framework  Routine security engagements  Improved metrics, reporting  Basic security logging STAGE 4  Mature IR plan with routine testing  Proactive analysis of log data  Automation for security operations  Device and services hardening  Mature runbook, process plan  Real-time threat Intelligence  Actionable recommendations Customer maturity scale 24 X 7 security monitoring 24 X 7 incident escalation with remediation guidelines Threat intelligence Compliance reporting Network flow behavior analytics User behavior analytics Insider threat monitoring Log management – 1 year External security assessments Vulnerability assessments Web application scanning PCI DSS ASV scanning Penetration testing STAGE 1  Reactive culture  Product-based solutions  Focus on simple perimeter defense  No visibility  Absence of KB, metrics, reporting  Project backlog STAGE 2  Additional Tools (IDS/IPS, AV) for detection and prevention  Basic reporting, visibility  Creation of security policies Services Delivered
  • 6. Unique Value Addresses Pain Points ©2020 Netenrich, Inc. All rights reserved. 6 Deep context w/ proprietary intel Dedicated team of experts Enhanced automated analysis Built in models/use cases Custom collector & log retention Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
  • 7. SOCaaS Architecture Private and confidential © Netenrich, Inc. 7 Netenrich Security PlatformSIEM set-up Level 2: Threat intel on in-built QRadar alerts  24 X 7 security monitoring and incident response  Skilled SOC Analysts  Threat intelligence  Standardized Delivery Model  Custom Dashboard & Widgets  Tailored Reporting + Alerts  Periodic Maturity Assessments Qualified security incidents with remediation guidelines CSIRT PROBLEM SOLVERS Custom Built Log Collector  Custom Shipper  Extended Security Monitoring  Provides EPS Reduction  Proprietary Connectors  Rapid Onboarding Framework  Direct ingestion of Logs to Cloud collectors IP enhanced IBM QRadar implementation  Proprietary Integration  AI Based Analysis & Filtering  Custom Business Context Use cases  AI Augmented Actionable Alerts  False Positive Reduction  Log Retention 2 way - Incident Automation SinglePaneofGlasswithStandardizedDashboard Level 1: Eradication of false positives On-prem | Cloud | Custom Application Support Netenrich SOC Client’s ITSM solution
  • 8. ©2020 Netenrich, Inc. All rights reserved. 8
  • 9. ©2020 Netenrich, Inc. All rights reserved. 9
  • 10. ©2020 Netenrich, Inc. All rights reserved. 10
  • 11. ©2020 Netenrich, Inc. All rights reserved. 11
  • 12. ©2020 Netenrich, Inc. All rights reserved. 12
  • 13. ©2020 Netenrich, Inc. All rights reserved. 13
  • 14. ©2020 Netenrich, Inc. All rights reserved. 14
  • 15. ©2020 Netenrich, Inc. All rights reserved. 15
  • 16. ©2020 Netenrich, Inc. All rights reserved. 16
  • 17. 150+ clients 5000+ devices 30k+ EPS SUSPICIOUS EVENTS Low Level Alerts- e.g.: Port Scan ACTIONABLE SECURITY EVENTS PER DAY Very High-Level Alerts Investigated by SOC Analyst EVENTS THAT TRIGGER REVIEW High-Level Alerts- SOC Analyst ATTACKS FROM ABUSIVE ATTACKERS Mid-Level Alerts Correlated with Database Filter Out Lower Priority Events Correlate Criticality of Attacks Advanced Correlation Content & Threat Intelligence Apply Content Rules & SOC Analysts Investigate 250,000 5,000 25 - 50 2-5 100 Million Security Events Monitored Per Day Netenrich SOC – Technical Metrics
  • 18. SOCaaS Enabling Your Team ©2020 Netenrich, Inc. All rights reserved. 18 Source: Improving the Effectiveness of the Security Operations Center, Ponemon Institute 2019,
  • 19. Cost vs Outcomes ©2020 Netenrich, Inc. All rights reserved. 19 Requirements 40% reduction in EPS 50% faster onboarding 35% reduction in SOC cost Enhanced detection Elastic consumption (data management) Only contract the business outcomes you need
  • 20. Realign with the Business ©2020 Netenrich, Inc. All rights reserved. 20 Enable your people Bridge skills gaps Decrease risk while reducing cost Optimize consumption Drive outcomes
  • 21. Hotel Chain Operating 13,063 Rooms Across 80 Locations in 7 Countries Private and confidential © Netenrich, Inc. 21 STANDARD SERVICE LEVEL | MANAGED SECURITY SERVICES 250+Onboarded 250+ devices in less than 15 business days 30+Custom use cases built per customer needs 40%Reduction in false positives by our AIOps engine Integrated with AWS and Azure native security solutions Ingested customers’ threat feeds into Netenrich Security Integration with problem management workflows for faster remediation
  • 22. Let’s Engage! ©2020 Netenrich, Inc. All rights reserved. 22 Thank you!Our Cybersec Strength • 150+ Managed Security Services customers • 100+ best-in-class security specialists • 60+ R&D folks for Security products • 3 global delivery centers www.netenrich.com