Try GOLD - Free
Are You Building An Effective SOC?
Security Advisor Middle East
|September - October 2019
Palo Alto Networks senior director and chief security officer Haider Pasha sheds light into how an effective SOC can enable an organisation to defend its Data and Protect its reputation.
-

Today, businesses spend heavily on cybersecurity. But to get value for their money, they need an overarching strategy. The state-of-the-art approach is to build an effective security operations center (SOC).
ASOC is commonly referred to as the central command center for cybersecurity operations. A team of security analysts uses advanced detection tools to identify, record and repel cyberattacks. The analysts work with a playbook of processes laying out the steps they need to take to keep their organisation secure.
Many large businesses have implemented successful SOCs, especially those dealing with sensitive data such as personally identifiable information (PII). Typically, these include financial and retail companies but also those working with governments and organisations looking to digitise services and use big data.
More mid-sized businesses are following suit, though the majority prefer to outsource their SOC to reduce costs. Companies that offer outsourced cyber protection are known as managed security services providers (MSSP).
Organisations often build a SOC when they have dozens of security tools operating across their network but struggle to make sense of all the data they produce. Large organisations typically have products from between 40 to 60 security vendors, from endpoint protection and intrusion detection systems to firewalls and scanning tools. Each security tool can generate large volumes of data about network activity and any suspicious exploits.
This story is from the September - October 2019 edition of Security Advisor Middle East.
Subscribe to Magzter GOLD to access thousands of curated premium stories, and 10,000+ magazines and newspapers.
Already a subscriber? Sign In
MORE STORIES FROM Security Advisor Middle East

Security Advisor Middle East
CITRIX REDEFINES SECURE ACCESS FOR THE HYBRID ERA
FRANCOIS VAN DEVENTER, CTO AT MICLOUDSW, SHARES HOW CITRIX IS TRANSFORMING FROM A REMOTE-ACCESS PIONEER INTO A MODERN ACCESS SECURITY LEADER-EMPOWERING ENTERPRISES TO THRIVE IN AN AI-DRIVEN, ZERO-TRUST WORLD.
7 mins
October 2025
Security Advisor Middle East
KASPERSKY STRENGTHENS CLOUD PROTECTION WITH NEW CLOUD WORKLOAD SECURITY UPDATE
Kaspersky, together with Smart Africa and Africaines in Tech, has launched an innovative, science-backed career orientation test “Future You in Tech” created to promote professional development for young women in the cybersecurity industry and help remove potential entry barriers. The test is designed to help them discover which career paths best align with their interests, skills, and personality.
2 mins
October 2025

Security Advisor Middle East
SANS STRENGTHENS GULF CYBERSECURITY SKILLS THROUGH IMMERSIVE TRAINING, AI-DRIVEN LEARNING
NED BALTAGI OF SANS INSTITUTE OUTLINES HOW ADVANCED TRAINING, NATIONAL WORKFORCE ALIGNMENT, AND AI-FOCUSED FRAMEWORKS ARE SHAPING A MORE RESILIENT CYBERSECURITY LANDSCAPE ACROSS SAUDI ARABIA AND THE WIDER REGION.
4 mins
October 2025

Security Advisor Middle East
FORTINET SECURES DUBAI ENGLISH SPEAKING SCHOOL'S NEW ACADEMIC CITY CAMPUS WITH INTEGRATED NETWORKING AND SECURITY SOLUTIONS
DEPLOYMENT SUPPORTS GROWTH, DELIVERS CENTRALIZED NETWORK MANAGEMENT, AND STRENGTHENS CYBERSECURITY FOR HYBRID LEARNING IN THE EDUCATION SECTOR
2 mins
October 2025

Security Advisor Middle East
FROM CONTINUITY TO CONTINUOUS BUSINESS
COMMVAULT'S FADY RICHMANY OUTLINES HOW MULTI-CLOUD ADOPTION, AI DISRUPTION, AND RELENTLESS THREATS DEMAND A NEW RESILIENCE PLAYBOOK FOR THE UAE'S DIGITAL-FIRST FUTURE.
10 mins
October 2025

Security Advisor Middle East
SENTINELONE NAMED A LEADER IN THE 2025 IDC MARKETSCAPE FOR WORLDWIDE XDR SOFTWARE
SentinelOne, the leader in AI-native cybersecurity, announced that it has been recognised as a Leader in the IDC MarketScape: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment. It is the latest third-party recognition of the company's Al-powered Singularity platform and its state-of-the-art approach to leveraging both native and third-party security data to stop attacks.
1 mins
October 2025

Security Advisor Middle East
RANSOMWARE PAYMENTS ARE DROPPING, BUT EMEA ORGANISATIONS ARE STILL UNPREPARED FOR ATTACKS
DESPITE THE NUMBER OF ORGANISATIONS PAYING RANSOMS DROPPING BY 22% YEAR-ON-YEAR, 63% WOULD STILL BE UNABLE TO RECOVER FROM A SITE-WIDE CRISIS DUE TO A LACK OF ALTERNATIVE INFRASTRUCTURE PLANS.
2 mins
October 2025

Security Advisor Middle East
FORTINET REPORT REVEALS CONTINUED RISE IN DATA LOSS DESPITE SMARTER DATA SECURITY PRACTICES AND RECORD CYBERSECURITY SPENDING
BUDGETS FOR DATA SECURITY ROSE AT 72% OF ORGANISATIONS LAST YEAR, YET 41% OF ORGANISATIONS STILL LOST MILLIONS TO INSIDER-DRIVEN DATA INCIDENTS
3 mins
October 2025

Security Advisor Middle East
VAD TECHNOLOGIES, CYBERX JOIN FORCES TO STRENGTHEN PEOPLE-CENTRIC CYBERSECURITY ACROSS GCC
THE NEW PARTNERSHIP AIMS TO EMPOWER ENTERPRISES TO BUILD CYBER-RESILIENT WORKFORCES AND DRIVE A CULTURE OF AWARENESS ACROSS THE REGION.
2 mins
October 2025

Security Advisor Middle East
FROM AWARENESS TO ACTION: THE UAE'S CYBERSECURITY FRONTLINES TAKE CENTRE STAGE AT GITEX 2025
OCTOBER BRINGS A POWERFUL CONVERGENCE FOR THE UAE'S DIGITAL LANDSCAPE—WHERE GITEX GLOBAL 2025 AND CYBERSECURITY AWARENESS MONTH UNITE TO SPOTLIGHT THE NATION'S LEADERSHIP IN RESILIENCE, INNOVATION, AND SECURE DIGITAL TRANSFORMATION.
8 mins
October 2025
Translate
Change font size