<img src="//bat.bing.com/action/0?ti=5751651&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">
Taking Technology Further

CTO INSIDER BLOG:
USING TECHNOLOGY TO IMPROVE HOW YOU DO BUSINESS

SUBSCRIBE

What Can a Secure Operations Center Do for You?

by Steve Knutson on October 12, 2017

Security threats are rising with an increasing emphasis on smaller businesses. Hackers see them as easy targets and gateways to larger businesses. The famous attack on Target in 2013 was actually through one of their small vendors.

At Marco, we’re helping businesses protect themselves and fight against attacks – 24 hours a day. We built a Secure Operations Center that is fully staffed to protect primarily our Managed WAN clients. 

Secure Operations Centers, or SOC for short, are changing the security landscape today by remediating security vulnerabilities and reducing an organization’s exposure to hacks. They are typically located in nondescript facilities. Inside, the network security staff monitors, analyzes and actively manages the security of an organization’s network using data collection appliances, also known as DCAs.

20171011_074318-2.jpg

The concept is not new. I did something similar early in my career. But at that time, it was limited to government agencies and large enterprises that had the resources and highly skilled manpower to execute. 

Now smaller organizations are gaining access to the technology and personnel to more effectively protect themselves from attacks. Here’s a look at some of the key functions of a Secure Operations Center:

  • Active Network Scanning
    Actively probe hosts use network traffic to elicit a response and analyze these responses to determine the presence of a vulnerability. Examples of potential vulnerabilities include unpatched software or misconfigurations.

  • Host-based Assessment
    With specialized software, we can perform a more accurate and comprehensive detection of vulnerabilities. We inspect installed software and continuously compare it against a list of known vulnerable software.

  • Behavioral Monitoring
    At its most basic level, effective cyber security monitoring comes down to exception management. It is critical to keep looking for activities that represent exceptions to the norm within the organization. This could be policy violations, error messages, spikes in outbound network activity or unexpected reboots.

  • Security Information and Event Management
    There’s lot of data coming in and out every day. What does it all mean? What can it tell us? With the assistance of SIEM tools, we can find the latest threats by applying dynamic correlation rules against the mountain of disparate and varied event log data.


Given the prevalence and pervasiveness of security attacks, it’s highly likely that your organization will be compromised. It may have been already. The threats will continue to rise. But we can stay one step ahead with specialized tools and security engineers and analysts focused on detecting and remediating threats immediately. Every day, we prevent hundreds of attacks from causing damage to organizations – before they ever impact our clients or their users.

Learn More About Business IT Services  

Topics: Managed Services, Security, Network Security

What Can a Secure Operations Center Do for You?

Security threats are rising with an increasing emphasis on smaller businesses. Hackers see them as easy targets and gateways to larger businesses. The famous attack on Target in 2013 was actually...Read more

Techie, Which Career Path is Right for You?

Tech jobs are multiplying nationwide, up 7.3 million from last year. The strong majority of those jobs (6.9 million) are at technology companies – like Marco – but a growing number also are within...Read more

How Can Business Continue After a Disaster?

In the wake of the devastation caused by Hurricanes Harvey and Irma, questions have been raised about the potential for a business to continue after a disaster. Is it even possible? Yes. But it does...Read more

5 Smart Marketing Moves

What’s the best marketing pitch you’ve received lately? I bet it did not feel like a pitch at all. I prefer to not feel like I am being sold to – or sold out – when someone’s marketing to me. ...Read more

What Marketing Earns Business? Not This.

As the CTO and CIO at Marco, I get inundated – I mean inundated – with marketing solicitations. It used to be primarily mail, some email and the occasional call. Now, I can spend a good chunk of my...Read more

How Employees Can Protect You from a Cyber Attack

Security threats change every day. Are your employees ready to fight against them? It’s a question that’s often on my mind. Today, hackers do not hack systems; they hack people. A recent IBM study...Read more

You Might Need Managed IT Services If… (Thanks Jeff Foxworthy)

A friend recently asked, “What are key ways you know you need Managed IT Services?” Instantly, a rendition of the Jeff Foxworthy redneck one liners started running through my head. They were not...Read more

2 Tools for Faster Collaboration

The meeting is scheduled. Everyone shows up on time – some even early. The agenda is set. You check off all the calendar and meeting etiquette steps, we’ve talked about in recent blogs....Read more

Take Back Your Calendar: 7 Ways to Better Scheduling

In any given week, I will pull up my electronic calendar and find myself double or even triple booked. It’s become laughable. How can this be? Isn’t technology supposed to prevent this? I spend the...Read more

7 Ways to Improve Your Meetings

Technology is supposed to make us more productive – especially in our meetings. We have electronic calendars, e-communication tools and can start a meeting with anyone – anywhere in the world – with...Read more

What’s the Future of Data Centers?

In communities where the construction of new manufacturing facilities once adorned the headlines, we’re seeing a new economic player: data centers.  We’re creating and storing more information...Read more

When Customer Service Goes Wrong

I recently had one of my worst customer service experiences, if not the worst. It all started with the inability to connect to the Internet at a business that my family operates. It meant the...Read more

Does Your Security Have Enough Layers?

When I was in the U.S. military, I learned about the power of “defense in depth.” This defense strategy, that dates back to beginning of time, involves employing multiple layers of defense to resist...Read more

How Are You Looking for Opportunities to Improve?

As I walked with the Marco team into the airport to return home from a recent trip to Costa Rica, my first thought was, “There has to be a better way.” Some passengers walked straight to the...Read more

We’re Building Factories. Should You?

We’re building factories. While that’s a sentence I never expected to say as Chief Technology Officer of Marco, it’s not what you think. I am not talking about the traditional bricks-and-mortar...Read more

A Futuristic Notebook Is Here

I have piles upon piles of notepads of my handwritten notes filed in my desk drawer. Some of them date back quite far and yes, I still pull them out and refer to them. Sometimes, it takes some...Read more

Key Technology Services Go À La Carte

As a technology provider, we have to change our business model constantly to stay relevant and deliver value to our clients. That means being willing to update the products and services we sell and...Read more

How Technology Shifts Change Us

As Chief Technology Officer, I have helped provide the strategic direction of the technology and related services that Marco provides. In recent years, that role has become more demanding due to the...Read more

Futuristic Self-Service Arrives: Are You Ready for This?

I remember when my oldest daughter was two. Like many kids her age, she desired to do things herself. It didn’t matter if it took her longer to do it. As she grew older, it meant I waited patiently...Read more

5 Tech Trends That Will Impact Business in 2017

I’m often asked to pull out a crystal ball and talk about where technology is going. Preparing for the future and identifying the right technology for it is a main role I play as Chief Technology...Read more

Proximity Marketing Increases with Wi-Fi Access Apps

You know the saying that there is no such thing as a free lunch. The same is true when it comes to Wi-Fi. It’s become so common to jump on a network - for free - after quickly clicking “I agree” to...Read more

Password Alert: Your Account Could be Compromised

If you’re using your birthday, anniversary, kids’ birthdays or any information that can be found online – including your social media account – in your passwords, your account could easily be...Read more

Have Your Heard of the Dark Web?

Have you heard of the Dark Web? I bet not and I encourage you to resist the urge to Google it and start clicking. It is called the Dark Web for good reason.  The "Dark Web" is the encrypted...Read more

Where Are You On the Technology Curve?

My job is to stay ahead of the technology curve. That used to mean looking out three to five years – or even 10 years when I first started my career. Today, we expect some technology to be obsolete...Read more

What Do the Russian Hacks Mean to Your Organization?

There has been quite a bit of talk – and jokes – about the “Russian attackers” in recent days. So is the threat real and how does it impact your organization?Russian hackers claim they will try to...Read more