B&B - SECURITY OPERATIONS CENTRE (SOC)

Client Portal

WHAT IS A SOC?

A Security Operations Centre, or SOC, is a centralised function within an organisation employing people, processes, and technology to continuously monitor and improve an organisation’s security posture while preventing, detecting, analysing, and responding to cyber security incidents.

The key aims of a SOC are:

  • To detect and respond to threats, keeping the information held on systems and networks secure;
  • To increase resilience by learning about the changing threat landscape (both malicious and non-malicious, internal and external);
  • To identify and address negligent or criminal behaviours; and
  • To derive business intelligence about user behaviours to shape and prioritise the development of technologies.

WHY YOU MIGHT NEED A SOC

As companies embrace digital transformation and new ways of working, keeping sensitive information safe and secure is a growing challenge for both employers and employees.

In the ever evolving corporate landscape, companies that are seeking to protect their customers’ identities, safeguard their intellectual property and avoid business disruption need to proactively monitor their environment so that they can rapidly detect threats and accurately respond before attackers are able to cause material damage.

Some examples of why you might need a SOC include:

  • You are running an online service for the public;
  • You host a number of sensitive databases which are accessed by staff on your premises, by remote staff, or by customers or partners;
  • You have several different office locations, and a unified security function delivers cost savings;
  • You share large quantities of sensitive data with other organisations; and
  • You require a single point of visibility for all your threats.

OUR MANAGED SOC

Bruce & Butler’s Managed SOC service – in partnership with and powered by IBM QRadar – provides the right mix of intelligence, human expertise, and technology to continually protect your organisation from cyber security threats. With this continuous monitoring in our safe hands, you can then focus on running your business – securely. This service provides all the benefits of a fully managed SOC without breaking your IT budget. 

Investing in an in-house Security Operations Centre (SOC) requires considerable setup and running costs. By leveraging our intelligent in-house Security Operations Centre (SOC) we can proactively protect your business against evolving cyber threats to maximise business protection and minimise business risk.

Our team will become your team and will respond to security events, clear the false alerts, and identify the severity of any others, fast.

In an environment where speed is critical, our dedicated Security Operations Centre works as an extension of your business, saving you time, money, and customer reputation. 

By monitoring and predicting threats around the clock, we can remove the resource pressure of research analysis that is required to accurately identify and prioritise the security incidents that are discovered on your network.

KEY FEATURES OF A SOC

SIEM & LOG MANAGEMENT

Our managed Security Information and Event Management system (SIEM) is a 24/7 intelligent cyber threat protection service, designed to monitor your infrastructure, systems, network and web applications for potential security breaches.

The SIEM collects logs and event data generated by different types of devices and collates it into one centralised hub. It takes this comprehensive data, collates it and organises it so a security analyst can then assess the data. 

The SIEM allows our analysts to have a holistic view of the network and combines multiple data feeds into one place ensuring everything can be monitored. Allowing any threat or vulnerability to be identified in a matter of minutes and not days.

BEHAVIOURAL MONITORING & ANALYTICS

Utilising the latest technology, we’ll build a profile of what regular system activity looks like on your network. This enables us to improve detection of unusual patterns and suspicious behaviour across your environment, so we can respond quickly to eradicate potential attacks and intrusions.

INTRUSION DETECTION / PREVENTION SYSTEMS

Intrusion detection is the process of monitoring the events occurring in your network and analysing them for signs of possible incidents, violations, or imminent threats to your security policies.

Intrusion Detection Systems (IDS) sit inside the network. We can then monitor inbound and outbound traffic depending on what devices are forwarding logs to us. IDS analyses the network and provides us with the information we need to ensure your network is running securely and hasn’t been breached.

Furthermore, Intrusion Protection Systems (IPS) acts to block threats that are identified within your network.


THREAT MINING

Threat Mining is the approach of actively researching (mining) threats on the web. Investigating what potentially could harm or affect our customers and ensuring the correct countermeasures are in place to protect our clients.

Threat mining is an ongoing activity conducted by our highly certified Security Operations Centre Analysts. All threats are added to our central threat database ensuring that all of our clients have got the correct measures in place to counter these threats.

Using the most up-to-date techniques and tooling our Security Operations Centre team scour the web for our clients. This is a key part of our SOC Advanced Threat Detection solution as this is the piece of the puzzle that could be the difference in whether you are breached, or you prevent a breach.

DARK WEB MONITORING

Gone are the days when compromised credentials and adversary communication could be found simply on the surface web by an organisation. 

Modern encryption and privacy mechanisms mean that this is no longer possible. Bruce & Butler utilises industry-leading Dark Web Monitoring technology to monitor dark and inaccessible corners of the internet in real time for indicators of compromise pertaining to an organisation.

FILE INTEGRITY MONITORING

Cyber attackers will often attempt to modify your critical system files in order to gain a foothold on your network and infrastructure. 

File Integrity Monitoring enables the Bruce & Butler SOC to quickly detect and respond to any activity of this nature, keeping your files safe at all times.

CONTINUOUS VULNERABILITY MONITORING

All businesses have vulnerabilities, this is a fact. It’s about how businesses monitor, remediate and categorise these vulnerabilities. Sometimes fixing a vulnerability can lead to more vulnerabilities being identified.

During our onboarding process of the Security Operations Centre solution we run a threat identification and categorisation process to identify what threats there are on the network and how impactful they are to the business. 

These are then categorised as:

  • Critical (Very high business impact – fix imminently), 
  • High (High business impact – fix as soon as possible), 
  • Medium (Medium business impact – fix when required, ideally quickly), and
  • Low (Low business impact, fix when able, low immediate risk factor).

Our Services

Contact Us
Today

Drop Us a line

Contact Us

  • This field is for validation purposes and should be left unchanged.