What is a managed SOC?
Every organisation wants to be protected against cyber attacks. Protection against cyber-attacks gets harder every day, as the attacks become more complex, are ever-evolving, and are increasing in numbers. You want to make sure you are protected, as breaches and successful attacks will hurt your reputation and can cost your organisation millions. How can (future) customers trust you again afterwards?
What is a SOC?
Before we can explain what a managed SOC is, we’ll explain what a Security Operations Center (SOC) is. As the word ‘centre’ implies, it’s the physical location of an information security team. The team is responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. They also actively prevent, detect, and respond to cybersecurity incidents.
In a SOC, the security team uses a combination of technology solutions and a strong set of processes. The team that works there usually consists of security analysts, engineers, and managers who oversee the security operations. The team works closely with the incident response team, who ensure that security issues are acted upon quickly after discovery.
Not all organisations are able to set up a Security Operations Center. This has several reasons but is often related to a lack of resources. They lack in-house expertise, time and costs to set it up, etc. That’s why outsourcing your SOC can be very valuable.
Managed SOC explained
Managed SOC, or SOC as a Service, offers organisations external cybersecurity experts who monitor your cloud environment, devices, logs, and network for threats. This is based on a subscription model, where you pay a monthly or yearly fee to make sure that threats are being detected and accordingly responded to.
With managed SOC, there is 24/7 monitoring of your IT infrastructure, without making a large investment in security software, hardware, security experts, training, and more. You can have quick access to a SOC and start the monitoring of cyber threats, which will improve your organisation’s security.
The service that a managed SOC team delivers is Managed Detection and Response (MDR).
Why outsourcing your IT security is not scary
Many decision-makers in the IT department find it difficult to outsource their IT security. This is concerning because most organisations don’t have the knowledge and manpower inhouse to keep their security up to date.
What is keeping companies from outsourcing?
- They want to keep complete control
- Privacy-sensitive data
- High cost
We understand these concerns, but they don’t always apply.
You won’t lose control of your security
Companies fear that they will lose control over their security when they outsource it. But, when outsourcing your security, you will not hand over all responsibilities and risks to an external party. As a company, you will remain ultimately responsible. That is why we rather speak of ‘out tasking’, because you move certain tasks to a Security Operations Center.
With a dashboard, you can keep real-time insights into what is happening within your organisation. The SOC team will notify you when there is a threat or breach in your network and provides feedback at a priority level. You then take action yourself, based on the solutions provided by the SOC team. You can also choose to make use of an incident response team. They will act on the treat on your behalf.
Your data will stay safe
Some organisations find outsourcing their IT security difficult because another company will get access to privacy-sensitive data and the chance of a leak will become bigger. This is a misconception because when you outsource your security to a SOC, the data remains in your company. A SOC will merely look at the metadata and log files. This means that a SOC can’t see the content of a file, but only what type of file it is, such as a .docx or .pdf.
The big advantage is that an external SOC is specialised in the protection of privacy-sensitive data. Our SOC, for example, is GDPR compliant and ISO-certified.
The cost to stay safe
With the rapid growth of cybercrime and the damage that can be done with it, it’s safer to invest in your IT security than undoing the damage. According to the IDC, an organisation needs to spend between 7% and 10% of its IT budget on security, but many organisations do not.
When you would invest in IT security specialists yourself this needs large investment in hiring and continuous training. Next to that, finding a qualified specialist is becoming difficult due to fierce competition. A Security Operations Center already has the right people inhouse who can support you and who receive the training they need to do their job properly.
Software used in a managed SOC
The team that monitors your network and systems do this with a Security Information & Event Management (SIEM) platform. It provides real-time analysis of security alerts and enhances threat detection and response capabilities. SIEM helps to give insights into the daily activities within your network and is the foundation of an effective security framework.
Choosing the right SOC as a Service
When choosing a Security Operations Center, it’s important that it has a clear Service Level Agreement (SLA) and the right ISO-certifications. But you can find these criteria at any SOC. What is more important is that the people at the SOC have the right skill set and that you trust them. You will be working closely with the SOC team, thus it’s important to know how they work, where they get their information and how fast and with what parties they come to action in case of an incident.
Get in touch with our expertsOur team is ready for you
Do you want to know more about this topic? Leave a message or your number and we'll call you back. We are looking forward to helping you further.
Latest news and blogs
Top five OT security threats
These OT Security threats provides an overview of critical and most common cyber threats to Operational Technology.
How can you secure your OT environment?
OT security in focus. The factors you need to consider when securing your OT environment. We provide individual, customised approaches and solutions and offer professional and expert support for your project.
Architectural choice: The key to a successful SASE journey
An organisation’s choice in architecture is critical because it can directly impact their SASE objectives. Choices made at the architecture definition stage will dictate how each service component supports current business needs.
Next stop on the SASE journey: Establishing a plan and team for success
We focus on the journey to Secure Access Service Edge (SASE), the focus will be identifying team members and developing a plan that will help ensure SASE success.
The road to SASE is a journey, not a sprint
You don't just implement SASE one day, it takes time and effort. One of the reasons is because nearly all organisations already have some degree of investment in technologies, making a quick adoption difficult. That is why the road to SASE is a journey, not a sprint.
Top 6 DDoS protection solutions that should be on your radar in 2021
Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS-attacks. These 6 should be on your radar in 2021! Find out more.
Cyber attacks Cloud security
Top cybersecurity threats to be aware of in 2021
Remote working, which is still the standard in 2021, brings new cybersecurity threats. These are the top threats of 2021.
Cyber attacks Security
Top cybersecurity companies to watch in 2021
We selected 6 top cybersecurity companies to watch in 2021, who have successfully differentiated themselves from other players in the market.
Double Trouble: Ransomware with Data Leak Extortion, Part 2
As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.
Top 5 best NGFW vendors of 2021
Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks continue to become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.
Security survey says: Don’t wait until it’s broken to fix it
In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.
NGINX App Protect: Advanced F5 Application Security for NGINX Plus
NGINX App Protect is a new application security solution that combines the efficacy of advanced F5 WAF technology with the agility and performance of NGINX Plus.
The importance of multi-factor authentication
Ethical hacker Victor Gevers reached news headlines this week as he managed to access president Donald Trump’s Twitter account for the second time.
Network security Network infrastructure
Viabuild selects Infradata as their guide towards an optimal security infrastructure
Infradata deploys a next generation endpoint protection solution at Viabuild enabling more visibility for remote workers.
Palo Alto Networks
Palo Alto Networks is a Forrester ZTX Wave Leader
Our partner Palo Alto Networks has been named a leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020. As Forrester states in their recent report, “Palo Alto Networks has a complete toolkit for Zero Trust,”.
CrowdStrike to acquire Preempt Security to advance Zero Trust Capabilities
CrowdStrike Holdings, our partner and leader in cloud-delivered endpoint and cloud workload protection, announced it has agreed to acquire Preempt Security. They are a leading provider of Zero Trust and conditional access technology for real-time access control and threat prevention.
Webinar: How CASB can protect your sensitive data
This is the last webinar in a serie of three cybertalk sessions. In this webinar Remco Hobo, Head of Cyber Security, explains how Cloud Access Security Broker (CASB) protects your sensitive data.
Webinar: Why DLP matters to your security strategy
This is the second webinar in a serie of three cybertalk sessions. In this webinar Sr. Solution Architect Cyber Security Kunal Biswas will simplify Data Loss Prevention (DLP).
Webinar: Demystifying SASE
This is the first webinar in a serie of 3 cybertalk sessions. In this first webinar our Sr. Solution Architect Cyber Security will demystify SASE (Secure Access Service Edge).
Custom Applications with CASB
MVC for Custom Applications will enable organizations to enforce CASB policies without the need for developers to spend a lot of valuable time writing code.
Time to Get Proactive About Threat Hunting
In the past, cyber security was treated as an afterthought by senior management. No longer! Company boards are attuned to the grave challenge that it poses to their businesses.
CrowdStrike Joins with Netskope, Okta and Proofpoint to Secure Remote Work
CrowdStrike, Netskope, Okta and Proofpoint are joining together to help better safeguard organizations by delivering an integrated, Zero Trust security strategy that is designed to protect today’s dynamic and remote working environments at scale.
Managing Cybersecurity in a Time of Pandemic
A top challenge for businesses is managing a remote workforce. You may have proper tools and remote secure access solutions in place since remote work is not a new concept. But how do you scale?
Top 5 Next-Generation NGFW Firewall Vendors 2020
Firewall technology has evolved significantly over the past decade. We review 5 of the best NGFW vendors for 2020, including advanced Next-Generation Firewall features to look for.
Building an Enterprise Grade SD-WAN
The next step in the evolution of connectivity services is having the best SD-WAN solution, where the underlying technology is not new, but rather the way in which it is managed is new.
Preparing for the Surge in Attacks Targeting Remote Workers
FortiGuard Labs team has been monitoring a significant spike in coronavirus and COVID-19 related threats. How to protect remote workers?
5 reasons to consider a managed SOC service provider
When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.
Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce
Learn what six key factors can help ensure remote worker cybersecurity and how to adopt a remote workforce quickly.
Infoblox BloxOne Threat Defense – Simple and Effective Protection for Remote Workers
Infoblox BloxOne Threat Defense Cloud allows remote users to be protected by installing lightweight client software (for Windows and MacOS) – BloxOne Endpoint. Simple and effective remote security for employees.
Zero Trust – Big Aspirations, High Hopes, What Next
The sheer volume of cyberattacks and the enormity of data breaches in 2019 have challenged the veracity of secure access defenses, even in well-funded organizations.
Juniper Networks Mist AI
Encrypted Traffic Analysis for Juniper Advanced Threat Prevention and SecIntel for Mist Wireless
Juniper Encrypted Traffic Analysis for Juniper Advanced Threat Prevention and SecIntel for Mist Wireless. Encrypted traffic analysis is the latest feature to Juniper ATP Cloud and SRX Series firewalls.
McAfee to Acquire Light Point Security
McAfee plans to integrate Light Point Security’s browser isolation technology into McAfee Secure Web Gateway, complementing its existing comprehensive inbound and outbound protection for all web and cloud traffic.
New EKANS ransomware targets industrial control systems
EKANS has the ability to independently terminate selected running processes, i.e. applications, on infected computers. Read all about what EKANS is in this expert blog.
Five zero-day vulnerabilities in Cisco Discovery Protocol
Five new zero-day vulnerabilities were found in the Cisco Discovery Protocol. Here's how to identify devices at risk.
Security Lessons From 2019’s Biggest Data Breaches
The biggest cyber security breaches of 2019 and what to learn from them
5 ways to boost your cyber security in 2020
Finding the best cyber security solutions in 2020 starts by improving policies and strengthening existing security tools in use.
Endpoint security EDR
Top 5 Endpoint Security Solutions 2020
A cyber security strategy that does not address endpoint security, is no strategy. We select the 5 best endpoint security vendors to watch in 2020.
Security Managed services
Eight major benefits of having a Managed Security Services Provider (MSSP)
Managed Security Services Providers (MSSPs) provide structural security solutions against cyberattacks, including always up-to-date expertise in the latest cyber threats and appropriate solutions. Here's 8 benefits of the best MSSP to prevent cyberattacks and save costs.
Juniper Universal Services Framework for Security = Operational Consistency
Juniper announces the SPC3 security services card for MX240, MX480 and MX960 routers and Universal Services Framework.
Bait and Tackle: What Can Be Done About Phishing?
What are the key factors that allow phishing attacks to keep happening? And what phishing security measures can be effective?
Why application delivery should look more like a factory (and less like an artisan’s shop)
In the long-ago pre-cloud era, application delivery looked very different than it does today. That’s because nothing moved faster than the speed at which IT could procure and provision the servers on which the applications ran. Planning for new applications or major application updates took many months or years.
Implementing zero trust: Time to think beyond identity
Digital transformation and multi-cloud adoption by enterprises are forcing organizations to re-think the traditional network perimeter
Prevent lateral compromise with microsegmentation
Why network microsegmentation matters for network security and how it helps mitigate the spread of lateral compromise.
Fortinet Acquires SOAR provider CyberSponse
"With the integration of CyberSponse’s powerful SOAR platform into the Fortinet Security Fabric, we will offer customers accelerated incident response and the ability to standardize and scale processes"
McAfee Introduces CASB-Integrated Cloud Security Platform for Container-Based Applications
McAfee MVISION Cloud for Containers provides: Cloud Security Posture Management (CSPM), “Shift Left” DevOps Integration, Vulnerability Scanning of container images.
Routing Juniper Networks
Juniper incorporates Security Intelligence to MX Series Routers
Juniper Networks incorporates Juniper Networks’ security intelligence onto the MX Series routers. Security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale.
19 Cloud Security Best Practices for 2019
Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.
Budgeting for Cybersecurity: Are You Doing It Right?
For CISOs and cybersecurity teams in your organization, every action and investment should be made with the goal of mitigating risk.
Crowdstrike gets highest rating in Gartner's Customer’s Choice for Endpoint Protection Platforms
As on of the best endpoint protection platforms in 2019, Crowdstrike now received the Gartner Customer’s Choice with the highest overall rating (4.9 out of 5) among endpoint security vendors.
Rapid international expansion thanks to specialisation
Interview with Infradata Group CEO Nino Tomovski. About the international growth of Infradata Group, Cyber Security solutions and the importance of local expertise.
Using Advanced AI to Stay Ahead of Cybercriminals
As the threat landscape continues to evolve rapidly, it now includes increasingly sophisticated, zero-day malware that traditional security approaches can no longer keep pace with. As a result, security researchers estimate that the cost of cybercrime will outpace security spend by over 16X
NetOps, SecOps, and DevOps: Merger Material?
DevOps are critical to companies aiming to feed the insatiable appetites of today’s digital economy. At the same time, NetOps teams race to deliver flawless performance—in real time—across an ever-more complex environment of data centers, cloud, and virtualized environment.
Maintaining Effective Endpoint Security 201
With the threat landscape evolving every day, is there more these organizations can do to sustain an effective endpoint strategy while supporting enterprise expansion? Let’s take a look at how teams can bolster endpoint security strategy.
Overcoming Security Challenges Impacting Multi-Cloud Environments
Cloud adoption is increasing at a rapid pace as organizations look for new ways to process, store, and distribute information. For many organizations, deploying new cloud services is much easier than requesting a dedicated set of hardware from IT teams.
Legacy laggards or transformation champions
Digital transformation is the new reality for all organisations, and the legal sector is no exception. How are law firms in the UK navigating the journey, and what are they doing to ensure that the opportunities digital delivers aren’t compromised by a lacklustre IT security stance?
A Beginner’s Cybersecurity Guide for Board Members
Cybersecurity for a board member or business executive, starts by getting acquainted with the CIS Controls, commonly referred to as the CIS 20, says M.K. Palmore of Palo Alto Networks
Data breach response plan: best practices in 2019
Data breach response plan best practices, enabling companies to retain business, customers, and shift brand perception in the market.
Decoding Email Security
Email Security expert blog by Kunal Biswas: Email is one of the most popular communication mediums for organisations today. It is also the most prominent attack vector. Emails are being accessed using multiple devices, from different locations, shaping a 'converged device landscape' for email use.
Cyber Security in 2020: A new dawn
What lies ahead in the near future for cyber security? What can we expect? In this blog I'll attempt to answer what cyber security might look like in 2020.
The Dark Side of Governments: A Growing Threat of APT Groups
For most nation states, covert advanced persistent threat (APT) groups are an equally valuable tool that operate in the shadows, stealing data, disrupting operations, or destroying the infrastructure of targeted enemies.
Top 5 Network Security Solutions and Technologies
The 5 best Network security solutions and technologies that help define and guarantee business success. Unfortunately many enterprises do not know what network security solutions are essential to securing their network and data.
Endpoint security EDR
5 Endpoint Security Best Practices
Your Cyber Security strategy should include Endpoint Security, as it is one of the most critical components for network security. In this article, our experts sum up Endpoint Security best practices for the Enteprise.
McAfee acquires container security startup NanoSec
McAfee, announced the acquisition of NanoSec, a multi-cloud, zero-trust application and security platform. The acquisition will enable organizations to improve governance and compliance and to reduce risk of their cloud and container deployments.
CrowdStrike Endpoint security
CrowdStrike Positioned as a Magic Quadrant “Leader” for Endpoint Protection Platforms 2019
Crowdstrike is positioned as a “Leader” in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP). This recognition from Gartner is the first time Crowdstrike has been placed in the Leaders Quadrant with their Crowdstrike Falcon Endpoint Protection Platform.
3 things we can learn from the Monzo PIN code breach
Earlier this week popular new UK challenger bank Monzo announced via its blog that they had been incorrectly storing approximately 20% of their users PIN numbers due to the way the system was designed when you performed a couple of different actions within their app.
Network security Enterprise networking
Top 5 Key Challenges for Network Security
We have compiled a list of key challenges regarding network security and cyberthreats, as numerous companies and governments are taking measures to ensure privacy and maintain security by preventing cyberattacks. Nevertheless, cybersecurity remains a constant and ongoing issue of considerable concern.
DDoS Attacks Growing Ever-More Sophisticated and Efficient
DDoS attacks in 2019 remain some of the most prevalent. Research of Forbes reports that there were 2,216 data breaches and more than 53,000 cyber security incidents in March 2018.
4 Emerging Challenges in Securing Modern Applications
Advanced threats force the best application security solutions to do more. Web Application Firewalls must be tested for security effectiveness. Here's 4 emerging challenges in securing modern applications
Top 5 Endpoint Security Solutions of 2019
Here's the 5 best endpoint security solutions. Recent studies show that 30 percent of known breaches involved malware being installed on endpoints. Select an Endpoint Protection Selecting that fits your needs considering these vendors
Security Chiefs: Don’t Ignore the 5G Future, It’s Coming Fast
5G is about to unleash a range of fantastic benefits for humanity. The next generation of mobile networks offers download speeds up to 100 or even 1000 times faster than 4G.
The 5 key IT security assessment types
Different IT Security Assessment types explained. Every day, digital attacks threaten the continuity of your business. Cybersecurity assessments accurately map out the threat.
Does size Matter? Capacity considerations when selecting a DDoS mitigation service
Internet pipes have gotten fatter in the last decade. We have gone from expensive 1 Mbps links to 1 Gbps links, which are available at a relatively low cost.
Effective Endpoint Security Strategy 101
Balancing your business’ objectives while ensuring your organization’s data is secure can be a challenge for many. But that challenge can be assuaged by addressing cyberthreats at the start – the endpoint. Adopting an effective endpoint protection strategy is crucial for a modern-day organization
Establishing the Zero-Trust Cybersecurity Framework
The principle 'Zero-Trust' is one of the most integral security frameworks in recent times. Its crux lies in simplicity - a default deny for all flows and concept of minimal access. To effectively realize 'Zero Digital Trust' in your ecosystem here's what it entails.
How to Secure Your Online Brand
How adversaries impersonate an organization’s online brand to target customers or employees. As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business.
Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro
What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.
Half of Top 12 Global Exploits Targeted IoT Devices
Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.
5G security: Challenges to overcome enabling new business models
As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.
ETSI releases IoT security standard
The European Telecommunications Standardisation Institute (ETSI) has released their initial standard for securing IoT devices.
Crowdstrike publishes Global Cyber Threat Report 2019
Crowdstrike addresses the quickening pace and increasing sophistication in adversary tactics, techniques and procedures (TTPs) in Cyber Threat 2019 report
Juniper Networks expedites 5G Transformation for Service Providers
Juniper Networks continues to expand to address use cases across access, pre-aggregation and aggregation to assist in the transitions from 4G LTE to 5G. Includes ACX700 Universal Metro Routers, industry-first 400GbE native MACsec support and Triton Silicon-powered 14.4Tb line cards for the PTX10008
Palo Alto Networks
Palo Alto introduces 'fastest Next-Gen Firewall' with PA-7000 series
The Next Generation Firewall PA-7000 Series, enhanced with new network processing cards, offers threat prevention at speeds twice as fast as the nearest competitor,
Another coding example that turned into a malicious threat
Two days ago an example of bad code popped up in the security community when a programmer was reviewing 7Zip's code to see if it would suit his needs. 7Zip is a free open source software for compression and packing/unpacking of ZIP and GZIP formats.
What is zero touch provisioning and is it useful for me?
Zero Touch Provisioning or ZTP is a term that appears increasingly on the feature list of networking products. ZTP can be found in switches, wireless access points, (SD-WAN) routers, NFV-platforms and firewalls.
Telecoms 2018 report: Respondents mark security as biggest perceived threat to industry
This month Telecoms.com published their Annual Industry Survey report. With over 1000+ responses from telecoms professionals, the report is a good reality check on the Telecom industry and provides a sober (and optimistic) look into the coming era of the industry.
Global media company transforms network security with visibility and Network Access Control (NAC)
Infradata supports a leading media company to strengthen the security of the network through Network Access Control (NAC). With this security solution, the security policy for access to the entire network as well as endpoint security is greatly improved.
6 cybersecurity trends you need to know for 2019
With the continuous growth of new emerging technologies and innovative Cyber Security solutions being developed, we asked our Cyber Security experts: What are the 6 cyber security trends for 2019 to watch?
European Commission unites on Cybersecurity Act
With nearly 40 percent of EU companies having no Incident Response Plan in place, and only 69 percent of EU companies having no or only a basic understanding of their exposure to cyber risks.
Arista to Demonstrate Any Cloud Networking for Kubernetes at KubeCon NA 2018
New solution uses Arista virtual and cEOS software instances to provide a uniform enterprise-class/cloud-grade routing platform with enhanced visibility and security features tied into OpenShift and Calico commercial enterprise platforms from Red Hat and Tigera.
Forcepoint Reveals Cyber Security Predictions for 2019
Forcepoint launched its Forcepoint Cyber Security Predictions 2019 Report . The report provides guidance on the sophisticated threats facing organizations in the months to come.
Symantec and Fortinet Partner to Deliver Cloud Security Service
Symantec and Fortinet announced an expansive partnership agreement today to provide customers with comprehensive and robust security solutions.
Manage Cyber Threats from any Source with new Data Integration by Juniper Networks
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources to offer enterprises a fast, flexible and automated defense against malicious activity
Pulse Secure expands Firewall Auto-provisioning and Behavioral Analytics for IIoT Security
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories.
Fortinet Introduces New Security Automation Capabilities on Amazon Web Services
Fortinet announced the expansion of its Fortinet Security Fabric offerings and new automation capabilities for AWS to provide streamlined and consistent security management for hybrid infrastructures.
Mirai: Not Just For IoT Anymore
Botmasters have taken the lessons from developing Internet of Things (IoT) malware and shifted their focus to targeting commodity Linux servers. Like many IoT devices, unpatched Linux servers linger on the network, and are being abused at scale by attackers sending exploits to every vulnerable server they can find.
CrowdStrike gets highest score in Gartner peer insights customer's choice Endpoint Protection Platform
CrowdStrike Falcon receives high score of 4.8 out of 5 based on highest user satisfaction among Endpoint Protection Platform vendors
2018 Holiday Season Mobile Malware Attacks Are Prevalent
Fortinet Threat Report Reveals Over One-quarter of Organizations Experienced a Mobile Malware Attack. Read more about the 2018 Cyber Security report by Fortinet here.
Dipping into the honeypot
Brute-forcing factory default usernames and passwords is a winning strategy for Internet of Things (IoT) botnet propagation. Research Analyst Matthew Bing dives into the details of IoT botnets.
Fortinet expands OT Security with new additions to fabric-ready partner ecosystem
Nozomi networks joined by three new operational technology partners: RAD, Indegy and SecurityMatters.
The road to next level Data Loss Prevention
Data leaks happen constantly to many different organizations. We have examples of cases in which credit card data of hundreds of thousands of users was leaked, or disgruntled workers that copy sensitive data of the organization they want to leave, to later publish or sell that information in the external world, damaging users and businesses. There is no limit to the amount of data that can be leaked, nor to the amount of damage that can be done.
Raising Cyber Threat and Cyber Security awareness in 2019
We asked our Cyber Security expert Remco Hobo what challenges businesses are facing when it comes to raising Cyber Threat and Cyber Security awareness.
UK Government launches Code of Practice for IoT Security
The UK department for Digital, Culture, Media and Sport has launched a Code of Practice for consumer IoT security. The aim of the Code of Practice is to "support all parties involved in the development, manufacturing and retail of consumer IoT", as stated on the UK.gov website.
Why Mozilla Firefox's upcoming DoH update might be a mistake
"DoH does not solve a real problem. Contrary, it creates a problem." In his blog solution architect Hilmar Burghraaff dives into the potential risks of Mozilla moving DNS to HTTP over DNS.
Gartner and Forrester position Crowdstrike leader in endpoint security
Crowdstrike's cloud-delivered Endpoint protection solutions have been named a leader by Forrester and leads the visionary quadrant in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms.
Splunk expert review: Big Data analytics and Cyber Security
Splunk review: Splunk gathers, indexes, and correlates every type of data in real time to generate graphs, dashboards, warnings, and reports – all aligned with your business’s management needs.
7 best practices for cloud security
Securing your on-site environment becomes a highly complex challenge if you make use of additional cloud solutions. You're reluctant to write off your existing investments, although at the same time you realize that additional measures must be implemented. Read more about (multi-)cloud security best practices.
F5 launches SSL Orchestrator and Access Manager security products
SSL Orchestrator is a dedicated security appliance that delivers insights to mitigate threats traversing the network. F5 Access Manager protects sensitive data with a Zero Trust model.
The 5 best Cyber Security solutions of 2018
Learn about the five best cyber security solutions of 2018 so far, that utilize automation, artificial intelligence, and machine learning - to create the most robust security posture possible.
Top 5 NGFW Firewall Vendors 2018
Next-generation firewalls are essential to IT security. We review 5 of the best.
Research report names F5’s Web Application Firewall a leading solution
F5's WAF solution in top three of The Forrester Wave™ WAF Q2 2018 report. Out of ten Web Application Firewall vendors evaluated, F5 was one of three companies placing in the Leaders category for their application security solutions.
CrowdStrike Announces $1 Million Breach Prevention Warranty
Although many industries have long offered product warranties to assure customers the products they purchase will function as advertised, this has not been true for cybersecurity.
Kaspersky Lab Affair
The Dutch authorities recently announced that they are to stop using Kaspersky Labs’ end point security solutions, and were quickly followed by other major critical infrastructure providers. So what has driven this decision and what can we learn from it?
Secure and Automated Multicloud for any cloud, workload and deployment
Juniper Networks delivers orchestration and analytics for any cloud, any workload.
A trifecta of new security solutions from CrowdStrike
We are extremely excited to announce the Spring Platform Release — a trifecta of new security solutions.
From start-up to scale-up, and beyond…
It wasn’t so very long ago that the FTSE 500 was a pretty predictable patch. Most of the companies that made the cut had been in existence for up to 75 years, and having achieved their status they clung onto it. Newcomers were few and far between in this most exclusive of clubs.
Palo Alto Networks
Palo Alto Networks Announces Cloud-Based Logging Service in Europe
Palo Alto Networks announced the launch of its cloud-based Logging Service in Europe. This service allows customers to collect large amounts of their own security data from the Palo Alto Networks Next-Generation Security Platform, making large scale log collection affordable while addressing data privacy and location needs for many European organizations.
Miss you already – why GDPR is the next PPI
If I had a pound for every PPI related advert, email, text or unsolicited phone call I’ve ever received I’d be a wealthy woman, it would certainly amount to more than most actual PPI claims.
Meet Petya: the new type of Ransomware that infected the world this week
Over a month after the WannaCry attack, yet another type of Ransomware has resurfaced this week, codename: Petya. Companies have been infected worldwide,
Almost three quarters of IT security professionals claim to be better protected, but the cybercriminals are winning the war
Infradata today announced the results of its IT security survey conducted at Infosecurity Europe 2017. According to the IT security professionals who took the survey, 72% of organisations think they are better protected than they were twelve months ago.
Functionality, security and how not to become the next NHS casualty
I'm positioning myself as a new kind of hero. I won't wear a cape (my legs are too short) but I am fixing cyber crime once and for all. Sure you could spend millions but you won't be safe.
Infradata Acquires French Network Security Specialist Nomios
Infradata, leading independent Dutch integrator of secure carrier-grade networks, has acquired French network security company Nomios. With this acquisition, Infradata strengthens its capabilities in network security and will be able to expand its activities in the French marketplace.
Security Vulnerabilities with Juniper ScreenOS
An unauthorized code in the ScreenOS system is causing illegitimate remote administrative access, and allowing a knowledgeable attacker to monitor and decrypt VPN traffic.
Juniper Networks enhances next generation firewall capabilities to simplify and improve security for the enterprise edge
Juniper Networks, industry leader in network innovation, today announced powerful new capabilities in its Next-Generation Firewall (NGFW) solutions for protecting the enterprise edge, offering added security, control and efficiency while being easier to deploy and manage.
Power of DDoS attacks shows spectacular growth
Leiden, April 17th, 2013 – The amount of traffic generated by botnets in the average DDoS attack has multiplied by a factor of 8 in the last three months. In the fourth quarter of 2012 the average DDoS attack generated 5.9 Gbps of traffic.
Infradata about cyber attacks in the NRC Handelsblad
On the 13th of April 2013, Infradata was quoted in the NRC Newspaper based on an interview concerning the recent DDoS attacks in The Netherlands.
Infradata supports Ziggo with security migration
Ziggo and network integrator Infradata have joined forced to replace the firewalls in Ziggo’s operational network. After a comprehensive technical selection process, Ziggo opted for the firewall solutions by Juniper Networks and chose Infradata for delivery and implementation.