Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > IBM > SOC Optimization Whitepaper

SOC Optimization Whitepaper

White Paper Published By: IBM
Published:  Oct 13, 2015
Type:  White Paper
Length:  16 pages

The persistent and evolving threat landscape has created a need for smarter security solutions, and organizations are taking notice. Despite the tightening of IT budgets caused by the recent global economic slowdown, Gartner anticipates security spending to reach US$93 billion by 2017.1 which includes the areas of security testing, managed security service providers and security information and event management.

Building an enterprise security operations center (SOC) can be an effective path to reducing security vulnerabilities. An enterprise SOC encompasses the people, processes and technologies that handle information technology (IT) threat monitoring, forensic investigation, incident management and security reporting. It can include entirely internal operations, processes, technologies and staff, or a hybrid of out-tasked and internal capabilities. An enterprise SOC is particularly appropriate for large, global organizations that deal with significant amounts of data, which may be subject to complex legal and compliance requirements and at risk of targeted and sophisticated threats.

Tags : 
ibm, soc optimization, it threat, soc, security operations center, security vulnerabilities, gartner, networking