• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
  • All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
Forces Shaping Modern Security Operations

Forces Shaping Modern Security Operations

Google
Published by: Research Desk Released: Oct 18, 2021

Google Cloud + Deloitte: In this first article of the “Future of the Security Operations Center (SOC)” series, the team explores the forces shaping the modern SOC. A conversation about the ways to make threat detection more effective—the daily bread of Security Operations Centers (SOCs)—goes back to the dawn of the internet. Is it better to identify badness by signatures or through profiling? Automation is the most common way to scale, but is it as effective at finding malicious acts as a manual investigation by specialists? There are too many tools and, over the years, numerous attempts to consolidate visibility into a “single pane of glass” have failed. The late 1980s witnessed the first prototypes of anomaly-based intrusion detection; the 1990s—the first automation of response. Then the first SIEM (Security Information and Event Management) products born in the late 90s loudly promised to solve Intrusion Detection System (IDS) alert overload and the dreaded “false positives.”

 This paper defines “forces” as key salient factors that are shaping the modern challenges a SOC must overcome to continuously mature.

Welcome Dear

Thank you for your interest and your registration with Teradata. Please confirm your e-mail address to complete your registration by clicking here

Yes, confirm my

By confirming this, you give Teradata your consent to send you information on our data analytics products and services or invitations to events and webinars by e-mail from time to time. You can revoke this consent at any time by clicking on the unsubscribe link at the bottom of each of our e-mails. We assure you that we treat your contact details with the utmost care. Detailed information on how we store and use your personal data or how you can exercise your rights regarding your personal data can be found in the global Teradata Privacy Policy.