Skip to main content

São Paulo/SP – August 18, 2022. It is highly recommended that companies seek the best solutions for the information/data security of their business and, among some security measures, the SOC (Security Operation Center).

*By Nailton Paixão

In recent years cyber attacks have grown in Brazil and worldwide. In 2021 alone, in the world, there was an increase of 40% compared to 2020. In Brazil, according to a survey carried out by a specialized consultancy, the first half of 2021 had a volume of attacks that exceeded the number of cases of the year 2020, with an average of 9.1 million hits, an increase of 62% compared to the previous year. Even with these facts, information security is still considered a cost by many companies. Global losses have already reached the U$ 6 trillion range and prospects for the future are not optimistic.

In view of this, it is highly recommended that companies seek the best solutions for the security of their business information/data and, among some security measures, the SOC (Security Operation Center) is a solution that brings numerous benefits. By hiring a SOC service, it is possible to detect and contain cyber threats in an agile way, anticipating security incidents that may have some impact on the business.

But what exactly is a SOC?

The SOC or Security Operations Center (Security Operations Center, in free translation) is composed of a team of professionals whose main objective is to respond to any incidents that may occur. This type of focus helps to reduce incident response time and thereby avoid losses. SOC makes use of a range of solutions and technologies, from event management systems (SIEM), SOAR (Security Orchestration, Automation and response) to firewalls for intrusion detection. With this type of monitoring, the mitigation of occurrences happens very effectively. In addition, the SOC's activity is the continuous execution of network vulnerability scans in search of threats and weaknesses in the scanned system.

How does a SOC work?

As a team dedicated to information security, its main objective is to identify, analyze and respond to any incident, reporting its results in detail after its action. In some cases it may even include more advanced analysis such as forensic analysis, cryptanalysis and malware reverse engineering to analyze incidents. It is important to remember that everything will depend on the scope established at the time of hiring.

And how is a SOC implemented?

The first step in hiring a SOC service is to define a strategy aimed at your company's business objectives. With the strategy well defined, an infrastructure that supports the operation must be implemented. Typical SOC infrastructure should include: intrusion detection software, firewalls, IPS/IDS and event management systems. In terms of infrastructure definition, seeking a specialized consultancy in information security can provide the best solutions.

And what are the advantages of adopting a SOC service?

  • Real-time monitoring;
  • Efficiency in incident handling;
  • Specialized security team;
  • Cost/damage reduction;
  • Customizable service, according to the needs of each company;

Finally, it is not possible to think about the growth of a company without investing in cybersecurity solutions, regardless of the size of your company, the adoption of SOC is of paramount importance. That's why hiring a specialized consultancy, such as Safeway, is highly recommended.

— Nailton Paixão is Cybersecurity Consultant at [SAFEWAY]

How can we help?

THE SAFEWAY is an Information Security consulting company recognized by its clients for offering high value-added solutions through projects that fully meet the needs of the business. In 14 years of experience, we have accumulated several successful projects that have earned us credibility and prominence with our clients, who largely make up the 100 largest companies in Brazil.

today through 25 strategic partnerships with global manufacturers and our SOC, SAFEWAY is considered a one stop shopping with the best solutions in technology, processes and people. We have both the technical skills and the experience necessary to assist your company in the process of structuring controls and preparing the environment for the implementation of an ISMS, SGS or SGCN and, consequently, certification of operations, services or companies to the ISO27001, ISO20000 or ISO22301 standards.

In order to support companies in this process of evaluation and adaptation to the requirements of the LGPD, [SAFEWAY] has in its portfolio of services, the Cybersecurity Health Check whose objective is to carry out a diagnosis of the CyberSecurity, Information Security and Data Privacy implemented in your company, contemplating the pillars of Law SuitPeople and Technology.

through the Cybersecurity Health Check, risks associated with information security and privacy of internal processes and activities are identified, existing controls and new controls evaluated according to the size of your organization to increase the level of maturity and compliance, in accordance with good information security practices. If you would like more information, contact one of our experts!