Certificato di qualità Giacomo Lanzi

Quality certificate for the SOCaaS of SOD

Estimated reading time: 7 minutes

cybersecurity award 2021

The technology we use to deliver our SOCaaS has been awarded a quality certificate . Today we want to talk about this, explaining again what a SOC is and why a SOCaaS is an ideal solution for companies.

Of course, we will also explain what it is about when we talk about the quality certificate and how this ensures excellent service for our customers.

Differences between SOC and SOCaaS

A SOC, acronym for Security Operation Center , is a central command hub that acquires data from an IT infrastructure and analyzes it. Ideally, all devices that are part of the infrastructure are part of the data collection. This means, in the business environment, that every device connected to the network or that connects to the network by accrediting itself, should be included in the data collection.

A SOC is a physical place, with hardware tools, where a team of IT technicians manage the data flow and analyze it using the available tools. This means maintenance, installation and employee maintenance costs.

A more flexible variant is represented by SOCaaS, ie Security Operation Center as a Service . It is a model based on services provided by an external supplier that delocalizes the tasks of a SOC. With the increasingly important evolution and diffusion of the cloud, we have come to a situation in which SOCaaS is the main driver. Thanks to cloud technologies, in fact, data collection and network information, as well as logs, can be reached via the network.

To simplify: a SOCaaS is a SOC, which however is provided as a service; in practice, the brain of the SOC is connected to the infrastructure to be monitored and not internal to the company. The costs of implementation, maintenance and management are greatly reduced.

Thanks to SOCaaS and automation and analysis tools, the environment you want to control is constantly monitored and threats and anomalies are detected in real time.

SOD and quality certificate

Threats on the net have evolved over time to become extremely sophisticated. They target targets that fail to recognize them in a timely manner , resulting in damage that can be data loss or even the ransom note .

SOCaaS, as mentioned, simply allows you to save time and resources by replacing the staff to be employed in the search for the various malware that are always lurking.

We are pleased to say that the technologies we adopt in SOCaaS have been awarded a quality certificate and are positioned in the magic quadrant of Gartner. Among the resources available in our SOCaaS, we mention SDL , SIEM and UEBA .

SIEM collects all events and information to be managed, enriching the data in the SDL so that they are easily analyzed. UEBA’s user behavior analysis is invaluable when a social engineering attack arises.

Artificial intelligence offers an important help to our SOCaaS as it analyzes threats and possible risks. Furthermore, the constant presence of an available team ensures security against all ransomware attacks.

The quality certificate that our technology has received occupies a place of Leader in the Gartner’s Magic Quadrant . Gartner is an institution that has established who the most important IT vendors on the market since 1979.

Quality certificate equals excellence

It is essential these days to have a good valuation when you are in a certain market sector. For example, on eCommerce sites it is common to find user reviews before making a purchase. However, no one really guarantees that the reviews are genuine. Similarly, technologies available on the net are not always as beneficial as they appear. The Gartner Magic Quadrant takes care of that.

Gartner analyzes the players in the market for a service using qualitative analysis . Check the maturity, the participants and the market trends. The competition focuses on four aspects displayed in a graphical table, the so-called magic quadrant .

The quadrant is divided into categories: Visionaries, Challengers, Niche Players and Leaders. Most interest is directed towards the Leader position which represents the top for execution and completeness. Our technology is found right in the Leaders quadrant.

The Magic Quadrant offers almost immediate understanding of the most trusted providers on the market .

Obviously, there are various strategies to rely on when choosing a service or technology, and relying on Leaders is not always the best idea. What is good today may not be suitable in the future.

The alternatives could materialize in the market Challengers who move with speed or in the niche players who can guarantee a more precise and accurate service than a Leader.

Business objectives, in general, are the guide to follow and depend on your company but to be almost foolproof it is always better to ask for help from specialized companies able to provide advice and suggestions.

Quality certificate

The magic quadrant of Gartner

As mentioned earlier, the Magic Quadrant is read using four parameters that need careful viewing. Below is a generic magic dial, while by clicking here you can see the list of all the magic dials divided by topic.

generic magic quadrant

Leader

The supplier in the leading position has the credibility, market share and sales skills necessary for the distribution and acceptance of new technologies. Is able to understand the customer needs and always keeps an eye on innovation.

Sometimes he designs elaborate plans that he makes available to clients. In this way the infrastructures and strategies are efficient and feasible. From a financial point of view, it enjoys the stability and support of the platform, also thanks to the geographical coverage. This watch face can be defined as the real certificate of quality by looking at the magic dials.

Challenger

The greatest threat to the Leader is undoubtedly represented by the Opponent or Challenger. It works well and has a credible market position. The extreme faith in projects that can continually grow over time makes him capable of developing strong products.

While they are not as well established as the Leaders financially, they still remain stable and solid.

Visionary

The Visionary is perfect for all the novelties that could revolutionize the market. Such a supplier guarantees product innovation and is able to address operational and financial problems on a large scale.

One of the big flaws, however, is the instability due to unsustainable profitability and the ability to acquire market shares . Over time an investment can prove to be profitable or not but it basically depends on some signals that need to be interpreted.

The Visionary is often a private company or acquisition objectives by the more consolidated or large company because the possible risk probability of installing on their systems is lower in the event of an acquisition.

Niche operators or actors

The verticalization of the market or the focus on specific areas concerns all niche players. This supplier can be a large company but it is struggling to achieve the goal it has set or it is the one that adapts its product in order to enter a particular market.

In conclusion

Following your vision and establishing yourself online is never easy because it is not uncommon to encounter problems of various kinds, from a lack of resources to the difficulty of standing out on the market.

The technology we use for our SOCaaS has revolutionized the market and earned a place alongside the leaders in the Gartner Magic Quadrant. We are very happy with this milestone, which means better service for our customers, greater safety and in general the excellence we have always aimed for.

If you want to know how our services can help your business, do not hesitate to contact us, we will be happy to answer any questions.

Useful links:

Share


RSS

More Articles…

Categories …

Tags

RSS darkreading

RSS Full Disclosure

  • SEC Consult SA-20240513-0 :: Tolerating Self-Signed Certificates in SAP® Cloud Connector May 14, 2024
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on May 14SEC Consult Vulnerability Lab Security Advisory < 20240513-0 > ======================================================================= title: Tolerating Self-Signed Certificates product: SAP® Cloud Connector vulnerable version: 2.15.0 - 2.16.1 (Portable and Installer) fixed version: 2.16.2 (Portable and Installer) CVE number: CVE-2024-25642 impact: high homepage:...
  • TROJANSPY.WIN64.EMOTET.A / Arbitrary Code Execution May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/f917c77f60c3c1ac6dbbadbf366ddd30.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: TrojanSpy.Win64.EMOTET.A Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x64-bit "CRYPTBASE.dll" PE file in its current directory. Therefore, we can hijack the DLL and execute […]
  • BACKDOOR.WIN32.ASYNCRAT / Arbitrary Code Execution May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/2337b9a12ecf50b94fc95e6ac34b3ecc.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.AsyncRat Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x32-bit "CRYPTSP.dll" PE file in its current directory. Therefore, we can hijack the DLL and execute […]
  • Re: Panel.SmokeLoader / Cross Site Request Forgery (CSRF) May 14, 2024
    Posted by malvuln on May 14Updated and fixed a payload typo and added additional info regarding the stored persistent XSS see attached. Thanks, Malvuln Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/4b5fc3a2489985f314b81d35eac3560f_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel.SmokeLoader Vulnerability: Cross Site Request Forgery (CSRF) - Persistent XSS […]
  • Panel.SmokeLoader / Cross Site Request Forgery (CSRF) May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/4b5fc3a2489985f314b81d35eac3560f_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel.SmokeLoader Vulnerability: Cross Site Request Forgery (CSRF) Family: SmokeLoader Type: Web Panel MD5: 4b5fc3a2489985f314b81d35eac3560f (control.php) SHA256: 8d02238577081be74b9ebc1effcfbf3452ffdb51f130398b5ab875b9bfe17743 Vuln...
  • Panel.SmokeLoader C2 / Cross Site Scripting (XSS) May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/4b5fc3a2489985f314b81d35eac3560f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel.SmokeLoader Vulnerability: Cross Site Scripting (XSS) Family: SmokeLoader Type: Web Panel MD5: 4b5fc3a2489985f314b81d35eac3560f (control.php) SHA256: 8d02238577081be74b9ebc1effcfbf3452ffdb51f130398b5ab875b9bfe17743 Vuln ID:...
  • Panel.Amadey.d.c C2 / Cross Site Scripting (XSS) May 14, 2024
    Posted by malvuln on May 14Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/50467c891bf7de34d2d65fa93ab8b558.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Panel Amadey.d.c Vulnerability: Cross Site Scripting (XSS) Family: Amadey Type: Web Panel MD5: 50467c891bf7de34d2d65fa93ab8b558 (Login.php) SHA256: 65623eead2bcba66817861246e842386d712c38c5c5558e50eb49cffa2a1035d Vuln ID:...
  • Re: RansomLord v3 / Anti-Ransomware Exploit Tool Released May 14, 2024
    Posted by malvuln on May 14Updated, fixed typo SHA256 : 810229C7E62D5EDDD3DA9FFA19D04A31D71F9C36D05B6A614FEF496E88656FF5
  • RansomLord v3 / Anti-Ransomware Exploit Tool Released May 14, 2024
    Posted by malvuln on May 14Proof-of-concept tool that automates the creation of PE files, used to exploit Ransomware pre-encryption. Updated v3: https://github.com/malvuln/RansomLord/releases/tag/v3 Lang: C SHA256: 83f56d14671b912a9a68da2cd37607cac3e5b31560a6e30380e3c6bd093560f5 Video PoC (old v2): https://www.youtube.com/watch?v=_Ho0bpeJWqI RansomLord generated PE files are saved to disk in the x32 or x64 directories where the program is run from. Goal is to exploit...
  • APPLE-SA-05-13-2024-8 tvOS 17.5 May 14, 2024
    Posted by Apple Product Security via Fulldisclosure on May 14APPLE-SA-05-13-2024-8 tvOS 17.5 tvOS 17.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT214102. Apple maintains a Security Releases page at https://support.apple.com/HT201222 which lists recent software updates with security advisories. AppleAVD Available for: Apple TV HD and Apple TV 4K (all […]

Customers

Newsletter

{subscription_form_1}