Coming October 25: PeerSpot Awards will be announced! Learn more
2021-04-28T06:27:00Z
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
  • 6
  • 333

What are the latest trends in Security Operations Center (SOC)?

Trends in Security Operations Center (SOC)

Hi community members,

We would like to hear your insights on the latest trends in SOC. What are you seeing in the field or forecasting? 

Please share your opinions on how these trends are going to influence the future of the relevant tools and solutions used in SOC.

Thanks!

4
PeerSpot user
4 Answers
JK
CEO at a tech consulting company with 1-10 employees
Real User
Top 10
2022-08-16T14:53:00Z
16 August 22

- Decentralization: SOC Analysts do not sit in one room, not even work for one company or in the same country.


- More threat Intelligence: better IT-Feeds with more precise IOCs.


- Greater mandates: SOCs are increasingly mandated to isolate or shut down entire infrastructures. It is not a matter of the C-Level anymore.

Search for a product comparison in Information Security and Risk Consulting Services
John Rendy - PeerSpot reviewer
CTO at Systema Global Solusindo
Consultant
Top 5Leaderboard
2021-09-08T06:43:00Z
08 September 21

Evgeny, 


My personal experience tells me that SOC will be driven by next-generation platforms that can enable multiple use cases instead of just SIEM. The current SOC with a SIEM approach lacks the following aspects:


1. Data architecture platform which is not built on top of Big Data - which significantly hampers the way data is being processed and correlated. 


2. Capabilities to do anomaly detection to screen out the majority of noises that are being detected.


3. Capabilities to do User and Entity Behavioural Analysis to map against Insider threat.


4. Capabilities to do Threat Hunting easily


We are looking towards an elaborated platform that can perform all these functionalities in a simple yet robust architecture. Instead of focusing on SIEM to solve all the SOC problems, and on the other hand, you will then have to invest in many different solutions to perform those lacking capabilities, managing the disparate platform in a SOC is proven to be very challenging.


Now the trend is shifting towards an Open Platform for Detection and Response - as all of the capabilities can be built into a single platform with off course a significant reduction over the cost of investment. Utilizing AI to reduce the gap of skillsets required to manage and operate the SOC, leading to more effective human resources for managing a more complex threat detection.


I personally recommend SOC platforms like Stellarcyber.ai.

Remy Ma - PeerSpot reviewer
Network Security Services at ACE Managed Securty Services
Real User
2022-08-23T13:25:19Z
23 August 22

Security operations center (SOC) technology has been moving towards greater automation and machine learning (ML) in the last few years. The rapid evolution of cyber threats and attack surface expansion is also pushing SOCs towards focusing on efficient threat detection. 


The following are the latest SOC trends shaping the industry:




  • User and entity behavior analysis (UEBA) - Behavioral analytics is gaining popularity among SOC experts because attackers can still not accurately mimic user and system behavior. Powered by machine learning technology, UEBA cuts through the noise and speeds up threat detection.


  • Building hybrid SOCs with outside help – More and more modern SOCs are reaching out to third-party security service providers to reduce the pressure on their internal teams. The cybersecurity skills shortage, a barrage of alerts, response fatigue, and a large attack surface have motivated organizations to work with external cybersecurity experts. Hybrid SOCs are also more cost-efficient and scalable.


  • Cloud-native SOC strategy – The global shift towards cloud computing has introduced newer, more challenging cyber threats. Cloud-based systems need a cloud-native security strategy for comprehensive security. The era of SOCs confined within the walls of a data center has passed. Modern SOCs are remote, agile, and cloud-based.

Ibrahim Albalawi - PeerSpot reviewer
SOC Leader at a tech consulting company with 51-200 employees
Real User
2022-08-16T13:19:34Z
16 August 22

Hi,


UEBA, AI and ML.

Related Questions
goforitandy - PeerSpot reviewer
IT Consultant at Woohoogeeks
Apr 30, 2022
Hi peers, Is the war in Ukraine going to change our perspective of data security in the cloud?  Are we going to start reverting to onsite storage of data? What is your option?
See 1 answer
ZW
User at easybook
30 April 22
There is no need to change that.
JW
User at Ant Financial
Mar 31, 2022
Hi security professionals, Companies like Fuzzbuzz, Forallsecure are introducing fuzzing platforms to the public. Have you ever used this or an alternative tool in your company?  How has your experience been with that fuzzing tool? Thanks for the help!
See 1 answer
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
31 March 22
Hi @NagarajSheshachalam ​, @Nachu Subramanian , @KashifJamil ​, @Cuneyt KALPAKOGLU Phd. ​and @Jangsun KIM ​, Can you please help @JerryWang1 ​in answering this question or advising how to get the answers?
Related Articles
Syed S - PeerSpot reviewer
Project Manager - Information Security at Gulf International Bank
Apr 13, 2022
Have you ever wondered how effective project management can really help you with your Cyber security projects? In recent times, cybersecurity has become an increasingly important issue worldwide. Every year, businesses spend more time and effort protecting their data. Gartner forecasted that global security investments will exceed $172 billion in 2022. Nobody can underestimate the necessity o...
See 1 comment
BorisVishnevsky - PeerSpot reviewer
Sr.Dir/Managing Principal Technology Consulting at a consultancy with 10,001+ employees
13 April 22
Cybersecurity had been recognized as a Fifth War Domain a while back: Land, Sea, Air, Space, Cyber.  As such, planning for war is important since it provokes managers to THINK.  While the plans that these managers develop are mostly useless since these plans become mostly irrelevant when the Cyber Battle ensues. Preparedness, counterintelligence, logistics, skills, adaptability, and distributed decision-making become more important as compared to PMI principles and best practices ( 'the disciplined agile' should be included and focused on as part of the adaptability;-)).
Ram Chenna - PeerSpot reviewer
Enterprise Architect at Blueray Digital Services
Dec 15, 2021
Privacy Concerns in an RPA Implementation Program. The biggest concern we (as RPA solution implementors) have faced when interacting with clients and customers were: 1. Regulatory and Compliance issues. 2. InfoSec and Security issues. 3. Audit Issues. Regulatory and Compliance Issues: There is a huge penalty if the wrong data gets updated and emails are sent to customers by the regulatory...
Abhirup Sarkar - PeerSpot reviewer
Director, Middle East, East India & SAARC at EverestIMS Technologies
Dec 08, 2021
Zero Trust is a set of techniques to secure end-to-end IT network infrastructure. Given the complexity of today’s networks, Zero Trust security principles continue to evolve and adapt to current demands. As indicated by the history of Zero Trust, an evolving IT security landscape was what had eventually led to this concept. And right from the start, the end goal was to ensure a strong and resi...
Tjeerd Saijoen - PeerSpot reviewer
CEO at Rufusforyou
Jun 23, 2021
Security and protecting your environment are the biggest challenges now. Is this because we don't have software to protect our environment or is it anything else? In the past, I started with mainframes and no worries about hackers.  Today, we are dealing with a silo approach. Servers are at various locations, ICT staff is working in a silo environment and we are dealing with applications in...
Related Articles
Syed S - PeerSpot reviewer
Project Manager - Information Security at Gulf International Bank
Apr 13, 2022
How important is project management to the execution of cyber security projects?
Have you ever wondered how effective project management can really help you with your Cyber secur...
Ram Chenna - PeerSpot reviewer
Enterprise Architect at Blueray Digital Services
Dec 15, 2021
Privacy issues and regulatory laws to be complied with when implementing an RPA program
Privacy Concerns in an RPA Implementation Program. The biggest concern we (as RPA solution imple...