What is a managed SOC?

Every organisation wants to be protected against cyber attacks. Protection against cyber-attacks gets harder every day, as the attacks become more complex, are ever-evolving, and are increasing in numbers. You want to make sure you are protected, as breaches and successful attacks will hurt your reputation and can cost your organisation millions. How can (future) customers trust you again afterwards?

What is a SOC?

Before we can explain what a managed SOC is, we’ll explain what a Security Operations Center (SOC) is. As the word ‘centre’ implies, it’s the physical location of an information security team. The team is responsible for monitoring and analyzing an organization’s security posture on an ongoing basis. They also actively prevent, detect, and respond to cybersecurity incidents.

In a SOC, the security team uses a combination of technology solutions and a strong set of processes. The team that works there usually consists of security analysts, engineers, and managers who oversee the security operations. The team works closely with the incident response team, who ensure that security issues are acted upon quickly after discovery.

Not all organisations are able to set up a Security Operations Center. This has several reasons but is often related to a lack of resources. They lack in-house expertise, time and costs to set it up, etc. That’s why outsourcing your SOC can be very valuable.

Managed SOC explained

Managed SOC, or SOC as a Service, offers organisations external cybersecurity experts who monitor your cloud environment, devices, logs, and network for threats. This is based on a subscription model, where you pay a monthly or yearly fee to make sure that threats are being detected and accordingly responded to.

With managed SOC, there is 24/7 monitoring of your IT infrastructure, without making a large investment in security software, hardware, security experts, training, and more. You can have quick access to a SOC and start the monitoring of cyber threats, which will improve your organisation’s security.

The service that a managed SOC team delivers is Managed Detection and Response (MDR).

Placeholder for Architectural stairs glass roofArchitectural stairs glass roof

Why outsourcing your IT security is not scary

Many decision-makers in the IT department find it difficult to outsource their IT security. This is concerning because most organisations don’t have the knowledge and manpower inhouse to keep their security up to date.

What is keeping companies from outsourcing?

  • They want to keep complete control
  • Privacy-sensitive data
  • High cost

We understand these concerns, but they don’t always apply.

You won’t lose control of your security

Companies fear that they will lose control over their security when they outsource it. But, when outsourcing your security, you will not hand over all responsibilities and risks to an external party. As a company, you will remain ultimately responsible. That is why we rather speak of ‘out tasking’, because you move certain tasks to a Security Operations Center.

With a dashboard, you can keep real-time insights into what is happening within your organisation. The SOC team will notify you when there is a threat or breach in your network and provides feedback at a priority level. You then take action yourself, based on the solutions provided by the SOC team. You can also choose to make use of an incident response team. They will act on the treat on your behalf.

Your data will stay safe

Some organisations find outsourcing their IT security difficult because another company will get access to privacy-sensitive data and the chance of a leak will become bigger. This is a misconception because when you outsource your security to a SOC, the data remains in your company. A SOC will merely look at the metadata and log files. This means that a SOC can’t see the content of a file, but only what type of file it is, such as a .docx or .pdf.

The big advantage is that an external SOC is specialised in the protection of privacy-sensitive data. Our SOC, for example, is GDPR compliant and ISO-certified.

The cost to stay safe

With the rapid growth of cybercrime and the damage that can be done with it, it’s safer to invest in your IT security than undoing the damage. According to the IDC, an organisation needs to spend between 7% and 10% of its IT budget on security, but many organisations do not.

When you would invest in IT security specialists yourself this needs large investment in hiring and continuous training. Next to that, finding a qualified specialist is becoming difficult due to fierce competition. A Security Operations Center already has the right people inhouse who can support you and who receive the training they need to do their job properly.

Software used in a managed SOC

The team that monitors your network and systems do this with a Security Information & Event Management (SIEM) platform. It provides real-time analysis of security alerts and enhances threat detection and response capabilities. SIEM helps to give insights into the daily activities within your network and is the foundation of an effective security framework.

Choosing the right SOC as a Service

When choosing a Security Operations Center, it’s important that it has a clear Service Level Agreement (SLA) and the right ISO-certifications. But you can find these criteria at any SOC. What is more important is that the people at the SOC have the right skill set and that you trust them. You will be working closely with the SOC team, thus it’s important to know how they work, where they get their information and how fast and with what parties they come to action in case of an incident.

Get in touch with our expertsOur team is ready for you

Do you want to know more about this topic? Leave a message or your number and we'll call you back. We are looking forward to helping you further.

Send a message

Latest news and blogs

Placeholder for Engineers manufacturingEngineers manufacturing

OT security

Top five OT security threats

These OT Security threats provides an overview of critical and most common cyber threats to Operational Technology.

1 min. read
Placeholder for Wind power clouds greenWind power clouds green

OT security

How can you secure your OT environment?

OT security in focus. The factors you need to consider when securing your OT environment. We provide individual, customised approaches and solutions and offer professional and expert support for your project.

1 min. read
Placeholder for Building skyBuilding sky

SASE

Architectural choice: The key to a successful SASE journey

An organisation’s choice in architecture is critical because it can directly impact their SASE objectives. Choices made at the architecture definition stage will dictate how each service component supports current business needs.

1 min. read
Placeholder for Blue circleBlue circle

SASE

Next stop on the SASE journey: Establishing a plan and team for success

We focus on the journey to Secure Access Service Edge (SASE), the focus will be identifying team members and developing a plan that will help ensure SASE success.

1 min. read
Placeholder for Road blue skyRoad blue sky

SASE

The road to SASE is a journey, not a sprint

You don't just implement SASE one day, it takes time and effort. One of the reasons is because nearly all organisations already have some degree of investment in technologies, making a quick adoption difficult. That is why the road to SASE is a journey, not a sprint.

1 min. read
Placeholder for Windmills cityWindmills city

Anti-DDoS

Top 6 DDoS protection solutions that should be on your radar in 2021

Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS-attacks. These 6 should be on your radar in 2021! Find out more.

9 min. read
Placeholder for Shark threatShark threat

Cyber attacks Cloud security

Top cybersecurity threats to be aware of in 2021

Remote working, which is still the standard in 2021, brings new cybersecurity threats. These are the top threats of 2021.

1 min. read
Placeholder for Aerial view high riseAerial view high rise

Cyber attacks Security

Top cybersecurity companies to watch in 2021

We selected 6 top cybersecurity companies to watch in 2021, who have successfully differentiated themselves from other players in the market.

11 min. read
Placeholder for Ransomware aanval socRansomware aanval soc

Ransomware

Double Trouble: Ransomware with Data Leak Extortion, Part 2

As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.

1 min. read
Placeholder for Facade modern buildingFacade modern building

NGFW Firewall

Top 5 best NGFW vendors of 2021

Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks continue to become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.

9 min. read
Placeholder for ConstructionConstruction

Security

Security survey says: Don’t wait until it’s broken to fix it

In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.

1 min. read
Placeholder for Nginx app protect f5Nginx app protect f5

F5 Networks

NGINX App Protect: Advanced F5 Application Security for NGINX Plus

NGINX App Protect is a new application security solution that combines the efficacy of advanced F5 WAF technology with the agility and performance of NGINX Plus.

1 min. read
Placeholder for Network security engineers meetingNetwork security engineers meeting

Security MFA

The importance of multi-factor authentication

Ethical hacker Victor Gevers reached news headlines this week as he managed to access president Donald Trump’s Twitter account for the second time.

1 min. read
Placeholder for Modern architectureModern architecture

Network security Network infrastructure

Viabuild selects Infradata as their guide towards an optimal security infrastructure

Infradata deploys a next generation endpoint protection solution at Viabuild enabling more visibility for remote workers.

1 min. read
Placeholder for Sky view circleSky view circle

Palo Alto Networks

Palo Alto Networks is a Forrester ZTX Wave Leader

Our partner Palo Alto Networks has been named a leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020. As Forrester states in their recent report, “Palo Alto Networks has a complete toolkit for Zero Trust,”.

1 min. read
Placeholder for Crowdstrike partner reseller priceCrowdstrike partner reseller price

CrowdStrike Zero-Trust

CrowdStrike to acquire Preempt Security to advance Zero Trust Capabilities

CrowdStrike Holdings, our partner and leader in cloud-delivered endpoint and cloud workload protection, announced it has agreed to acquire Preempt Security. They are a leading provider of Zero Trust and conditional access technology for real-time access control and threat prevention.

1 min. read

Webinar: How CASB can protect your sensitive data

This is the last webinar in a serie of three cybertalk sessions. In this webinar Remco Hobo, Head of Cyber Security, explains how Cloud Access Security Broker (CASB) protects your sensitive data.

1 min. read
Placeholder for Webinar with womanWebinar with woman

Webinar: Why DLP matters to your security strategy

This is the second webinar in a serie of three cybertalk sessions. In this webinar Sr. Solution Architect Cyber Security Kunal Biswas will simplify Data Loss Prevention (DLP).

1 min. read
Placeholder for WebinarWebinar

Webinar: Demystifying SASE

This is the first webinar in a serie of 3 cybertalk sessions. In this first webinar our Sr. Solution Architect Cyber Security will demystify SASE (Secure Access Service Edge).

1 min. read
Placeholder for Threat huntingThreat hunting

Custom Applications with CASB

MVC for Custom Applications will enable organizations to enforce CASB policies without the need for developers to spend a lot of valuable time writing code.

1 min. read
Placeholder for Threat huntingThreat hunting

Time to Get Proactive About Threat Hunting

In the past, cyber security was treated as an afterthought by senior management. No longer! Company boards are attuned to the grave challenge that it poses to their businesses.

1 min. read
Placeholder for CrowdstrikeCrowdstrike

CrowdStrike

CrowdStrike Joins with Netskope, Okta and Proofpoint to Secure Remote Work

CrowdStrike, Netskope, Okta and Proofpoint are joining together to help better safeguard organizations by delivering an integrated, Zero Trust security strategy that is designed to protect today’s dynamic and remote working environments at scale.

1 min. read
Placeholder for Metal dark surfaceMetal dark surface

Managing Cybersecurity in a Time of Pandemic

A top challenge for businesses is managing a remote workforce. You may have proper tools and remote secure access solutions in place since remote work is not a new concept. But how do you scale?

1 min. read
Placeholder for Skyline reflectionSkyline reflection

Top 5 Next-Generation NGFW Firewall Vendors 2020

Firewall technology has evolved significantly over the past decade. We review 5 of the best NGFW vendors for 2020, including advanced Next-Generation Firewall features to look for.

1 min. read
Placeholder for Green snakeGreen snake

Building an Enterprise Grade SD-WAN

The next step in the evolution of connectivity services is having the best SD-WAN solution, where the underlying technology is not new, but rather the way in which it is managed is new.

1 min. read
Placeholder for Girl on bridge laptopGirl on bridge laptop

Preparing for the Surge in Attacks Targeting Remote Workers

FortiGuard Labs team has been monitoring a significant spike in coronavirus and COVID-19 related threats. How to protect remote workers?

1 min. read
Placeholder for Night city streetNight city street

5 reasons to consider a managed SOC service provider

When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.

8 min. read
Placeholder for Falcon x banner bgFalcon x banner bg

Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce

Learn what six key factors can help ensure remote worker cybersecurity and how to adopt a remote workforce quickly.

1 min. read
Placeholder for Infoblox partner reseller priceInfoblox partner reseller price

Infoblox BloxOne Threat Defense – Simple and Effective Protection for Remote Workers

Infoblox BloxOne Threat Defense Cloud allows remote users to be protected by installing lightweight client software (for Windows and MacOS) – BloxOne Endpoint. Simple and effective remote security for employees.

1 min. read
Placeholder for Runner street shimmerRunner street shimmer

Zero Trust – Big Aspirations, High Hopes, What Next

The sheer volume of cyberattacks and the enormity of data breaches in 2019 have challenged the veracity of secure access defenses, even in well-funded organizations.

1 min. read
Placeholder for Skyline reflectionSkyline reflection

Juniper Networks Mist AI

Encrypted Traffic Analysis for Juniper Advanced Threat Prevention and SecIntel for Mist Wireless

Juniper Encrypted Traffic Analysis for Juniper Advanced Threat Prevention and SecIntel for Mist Wireless. Encrypted traffic analysis is the latest feature to Juniper ATP Cloud and SRX Series firewalls.

1 min. read
Placeholder for City reflectionsCity reflections

McAfee to Acquire Light Point Security

McAfee plans to integrate Light Point Security’s browser isolation technology into McAfee Secure Web Gateway, complementing its existing comprehensive inbound and outbound protection for all web and cloud traffic.

1 min. read
Placeholder for Power plantPower plant

New EKANS ransomware targets industrial control systems

EKANS has the ability to independently terminate selected running processes, i.e. applications, on infected computers. Read all about what EKANS is in this expert blog.

1 min. read
Placeholder for Digital identityDigital identity

Five zero-day vulnerabilities in Cisco Discovery Protocol

Five new zero-day vulnerabilities were found in the Cisco Discovery Protocol. Here's how to identify devices at risk.

1 min. read
Placeholder for ArcadeArcade

Security Lessons From 2019’s Biggest Data Breaches

The biggest cyber security breaches of 2019 and what to learn from them

1 min. read
Placeholder for Futuristic bridge at nightFuturistic bridge at night

5 ways to boost your cyber security in 2020

Finding the best cyber security solutions in 2020 starts by improving policies and strengthening existing security tools in use.

1 min. read
Placeholder for Mountain viewMountain view

Endpoint security EDR

Top 5 Endpoint Security Solutions 2020

A cyber security strategy that does not address endpoint security, is no strategy. We select the 5 best endpoint security vendors to watch in 2020.

1 min. read
Placeholder for Milkyway lakesMilkyway lakes

Security Managed services

Eight major benefits of having a Managed Security Services Provider (MSSP)

Managed Security Services Providers (MSSPs) provide structural security solutions against cyberattacks, including always up-to-date expertise in the latest cyber threats and appropriate solutions. Here's 8 benefits of the best MSSP to prevent cyberattacks and save costs.

9 min. read
Placeholder for Juniper networks routingJuniper networks routing

Juniper Networks

Juniper Universal Services Framework for Security = Operational Consistency

Juniper announces the SPC3 security services card for MX240, MX480 and MX960 routers and Universal Services Framework.

1 min. read
Placeholder for Shark fish schoolShark fish school

Bait and Tackle: What Can Be Done About Phishing?

What are the key factors that allow phishing attacks to keep happening? And what phishing security measures can be effective?

1 min. read
Placeholder for F5 networks big ipF5 networks big ip

Why application delivery should look more like a factory (and less like an artisan’s shop)

In the long-ago pre-cloud era, application delivery looked very different than it does today. That’s because nothing moved faster than the speed at which IT could procure and provision the servers on which the applications ran. Planning for new applications or major application updates took many months or years.

1 min. read
Placeholder for Macro eyeMacro eye

Implementing zero trust: Time to think beyond identity

Digital transformation and multi-cloud adoption by enterprises are forcing organizations to re-think the traditional network perimeter

1 min. read
Placeholder for Leave green macroLeave green macro

Prevent lateral compromise with microsegmentation

Why network microsegmentation matters for network security and how it helps mitigate the spread of lateral compromise.

1 min. read
Placeholder for Fortinet firewallFortinet firewall

Fortinet Acquires SOAR provider CyberSponse

"With the integration of CyberSponse’s powerful SOAR platform into the Fortinet Security Fabric, we will offer customers accelerated incident response and the ability to standardize and scale processes"

1 min. read
Placeholder for Mcafee backgroundMcafee background

McAfee Introduces CASB-Integrated Cloud Security Platform for Container-Based Applications

McAfee MVISION Cloud for Containers provides: Cloud Security Posture Management (CSPM), “Shift Left” DevOps Integration, Vulnerability Scanning of container images.

1 min. read
Placeholder for Juniper networks mx seriesJuniper networks mx series

Routing Juniper Networks

Juniper incorporates Security Intelligence to MX Series Routers

Juniper Networks incorporates Juniper Networks’ security intelligence onto the MX Series routers. Security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale.

1 min. read
Placeholder for Glass architectureGlass architecture

19 Cloud Security Best Practices for 2019

Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.

1 min. read
Placeholder for Office buildingsOffice buildings

Budgeting for Cybersecurity: Are You Doing It Right?

For CISOs and cybersecurity teams in your organization, every action and investment should be made with the goal of mitigating risk.

1 min. read
Placeholder for Digital identityDigital identity

CrowdStrike

Crowdstrike gets highest rating in Gartner's Customer’s Choice for Endpoint Protection Platforms

As on of the best endpoint protection platforms in 2019, Crowdstrike now received the Gartner Customer’s Choice with the highest overall rating (4.9 out of 5) among endpoint security vendors.

1 min. read
Placeholder for Tunnel traffic nightTunnel traffic night

Rapid international expansion thanks to specialisation

Interview with Infradata Group CEO Nino Tomovski. About the international growth of Infradata Group, Cyber ​​Security solutions and the importance of local expertise.

1 min. read
Placeholder for Business woman 1Business woman 1

Using Advanced AI to Stay Ahead of Cybercriminals

As the threat landscape continues to evolve rapidly, it now includes increasingly sophisticated, zero-day malware that traditional security approaches can no longer keep pace with. As a result, security researchers estimate that the cost of cybercrime will outpace security spend by over 16X

1 min. read
Placeholder for Colourful leaves macroColourful leaves macro

NetOps, SecOps, and DevOps: Merger Material?

DevOps are critical to companies aiming to feed the insatiable appetites of today’s digital economy. At the same time, NetOps teams race to deliver flawless performance—in real time—across an ever-more complex environment of data centers, cloud, and virtualized environment.

1 min. read
Placeholder for Coffee meetingCoffee meeting

Maintaining Effective Endpoint Security 201

With the threat landscape evolving every day, is there more these organizations can do to sustain an effective endpoint strategy while supporting enterprise expansion? Let’s take a look at how teams can bolster endpoint security strategy.

1 min. read
Placeholder for Team discussionTeam discussion

Overcoming Security Challenges Impacting Multi-Cloud Environments

Cloud adoption is increasing at a rapid pace as organizations look for new ways to process, store, and distribute information. For many organizations, deploying new cloud services is much easier than requesting a dedicated set of hardware from IT teams.

1 min. read
Placeholder for Under the bridgeUnder the bridge

Legacy laggards or transformation champions

Digital transformation is the new reality for all organisations, and the legal sector is no exception. How are law firms in the UK navigating the journey, and what are they doing to ensure that the opportunities digital delivers aren’t compromised by a lacklustre IT security stance?

1 min. read
Placeholder for Management meetingManagement meeting

A Beginner’s Cybersecurity Guide for Board Members

Cybersecurity for a board member or business executive, starts by getting acquainted with the CIS Controls, commonly referred to as the CIS 20, says M.K. Palmore of Palo Alto Networks

1 min. read
Placeholder for Runner street shimmerRunner street shimmer

Data breach response plan: best practices in 2019

Data breach response plan best practices, enabling companies to retain business, customers, and shift brand perception in the market.

1 min. read
Placeholder for Green snakeGreen snake

Decoding Email Security

Email Security expert blog by Kunal Biswas: Email is one of the most popular communication mediums for organisations today. It  is also the most prominent attack vector. Emails are being accessed using multiple devices, from different locations, shaping a 'converged device landscape' for email use.

1 min. read
Placeholder for Bismuth gemstoneBismuth gemstone

Cyber Security in 2020: A new dawn

What lies ahead in the near future for cyber security? What can we expect? In this blog I'll attempt to answer what cyber security might look like in 2020.

1 min. read
Placeholder for Shark fish schoolShark fish school

The Dark Side of Governments: A Growing Threat of APT Groups

For most nation states, covert advanced persistent threat (APT) groups are an equally valuable tool that operate in the shadows, stealing data, disrupting operations, or destroying the infrastructure of targeted enemies.

1 min. read
Placeholder for Milkyway lakesMilkyway lakes

Network security

Top 5 Network Security Solutions and Technologies

The 5 best Network security solutions and technologies that help define and guarantee business success. Unfortunately many enterprises do not know what network security solutions are essential to securing their network and data.

1 min. read
Placeholder for Partial view of woman using laptopPartial view of woman using laptop

Endpoint security EDR

5 Endpoint Security Best Practices

Your Cyber Security strategy should include Endpoint Security, as it is one of the most critical components for network security. In this article, our experts sum up Endpoint Security best practices for the Enteprise.

1 min. read
Placeholder for City reflectionsCity reflections

McAfee acquires container security startup NanoSec

McAfee, announced the acquisition of NanoSec, a multi-cloud, zero-trust application and security platform. The acquisition will enable organizations to improve governance and compliance and to reduce risk of their cloud and container deployments.

1 min. read
Placeholder for Runner street shimmerRunner street shimmer

CrowdStrike Endpoint security

CrowdStrike Positioned as a Magic Quadrant “Leader” for Endpoint Protection Platforms 2019

Crowdstrike is positioned as a “Leader” in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP). This recognition from Gartner is the first time Crowdstrike has been placed in the Leaders Quadrant with their Crowdstrike Falcon Endpoint Protection Platform.

1 min. read
Placeholder for Wide angle sky line blueWide angle sky line blue

3 things we can learn from the Monzo PIN code breach

Earlier this week popular new UK challenger bank Monzo announced via its blog that they had been incorrectly storing approximately 20% of their users PIN numbers due to the way the system was designed when you performed a couple of different actions within their app.

1 min. read
Placeholder for Shark fish schoolShark fish school

Network security Enterprise networking

Top 5 Key Challenges for Network Security

We have compiled a list of key challenges regarding network security and cyberthreats, as numerous companies and governments are taking measures to ensure privacy and maintain security by preventing cyberattacks. Nevertheless, cybersecurity remains a constant and ongoing issue of considerable concern.

1 min. read
Placeholder for FlyoverFlyover

DDoS Attacks Growing Ever-More Sophisticated and Efficient

DDoS attacks in 2019 remain some of the most prevalent. Research of Forbes reports that there were 2,216 data breaches and more than 53,000 cyber security incidents in March 2018.

1 min. read
Placeholder for Smartphone closeupSmartphone closeup

4 Emerging Challenges in Securing Modern Applications

Advanced threats force the best application security solutions to do more. Web Application Firewalls must be tested for security effectiveness. Here's 4 emerging challenges in securing modern applications

1 min. read
Placeholder for Digital identityDigital identity

Endpoint security

Top 5 Endpoint Security Solutions of 2019

Here's the 5 best endpoint security solutions. Recent studies show that 30 percent of known breaches involved malware being installed on endpoints. Select an Endpoint Protection Selecting that fits your needs considering these vendors

7 min. read
Placeholder for Night city streetNight city street

Security Chiefs: Don’t Ignore the 5G Future, It’s Coming Fast

5G is about to unleash a range of fantastic benefits for humanity. The next generation of mobile networks offers download speeds up to 100 or even 1000 times faster than 4G.

1 min. read
Placeholder for Milkyway roadMilkyway road

Security

The 5 key IT security assessment types

Different IT Security Assessment types explained. Every day, digital attacks threaten the continuity of your business. Cybersecurity assessments accurately map out the threat.

4 min. read
Placeholder for FlyoverFlyover

Does size Matter? Capacity considerations when selecting a DDoS mitigation service

Internet pipes have gotten fatter in the last decade. We have gone from expensive 1 Mbps links to 1 Gbps links, which are available at a relatively low cost.

1 min. read
Placeholder for Digital identityDigital identity

Effective Endpoint Security Strategy 101

Balancing your business’ objectives while ensuring your organization’s data is secure can be a challenge for many. But that challenge can be assuaged by addressing cyberthreats at the start – the endpoint. Adopting an effective endpoint protection strategy is crucial for a modern-day organization

1 min. read
Placeholder for Northern lightNorthern light

Establishing the Zero-Trust Cybersecurity Framework

The principle 'Zero-Trust' is one of the most integral security frameworks in recent times. Its crux lies in simplicity - a default deny for all flows and concept of minimal access. To effectively realize 'Zero Digital Trust' in your ecosystem here's what it entails.

1 min. read
Placeholder for River and road helicopterviewRiver and road helicopterview

How to Secure Your Online Brand

How adversaries impersonate an organization’s online brand to target customers or employees. As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business.

1 min. read
Placeholder for Power plantPower plant

Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro

What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.

1 min. read
Placeholder for Power plantPower plant

Half of Top 12 Global Exploits Targeted IoT Devices

Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.

1 min. read
Placeholder for Lily flower macroLily flower macro

5G security: Challenges to overcome enabling new business models

As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.

1 min. read
Placeholder for People crossing streetPeople crossing street

ETSI releases IoT security standard

The European Telecommunications Standardisation Institute (ETSI) has released their initial standard for securing IoT devices.

1 min. read
Placeholder for Green snakeGreen snake

CrowdStrike

Crowdstrike publishes Global Cyber Threat Report 2019

Crowdstrike addresses the quickening pace and increasing sophistication in adversary tactics, techniques and procedures (TTPs) in Cyber Threat 2019 report

1 min. read
Placeholder for Milkyway roadMilkyway road

Juniper Networks expedites 5G Transformation for Service Providers

Juniper Networks continues to expand to address use cases across access, pre-aggregation and aggregation to assist in the transitions from 4G LTE to 5G. Includes ACX700 Universal Metro Routers, industry-first 400GbE native MACsec support and Triton Silicon-powered 14.4Tb line cards for the PTX10008

1 min. read
Placeholder for Feather macroFeather macro

Palo Alto Networks

Palo Alto introduces 'fastest Next-Gen Firewall' with PA-7000 series

The Next Generation Firewall PA-7000 Series, enhanced with new network processing cards, offers threat prevention at speeds twice as fast as the nearest competitor,

1 min. read
Placeholder for Laptop dev codeLaptop dev code

Another coding example that turned into a malicious threat

Two days ago an example of bad code popped up in the security community when a programmer was reviewing 7Zip's code to see if it would suit his needs. 7Zip is a free open source software for compression and packing/unpacking of ZIP and GZIP formats.

1 min. read
Placeholder for Windmills cityWindmills city

SD-WAN

What is zero touch provisioning and is it useful for me?

Zero Touch Provisioning or ZTP is a term that appears increasingly on the feature list of networking products. ZTP can be found in switches, wireless access points, (SD-WAN) routers, NFV-platforms and firewalls.

Jan-Willem Keinke
Placeholder for Jan Willem KeinkeJan Willem Keinke

Jan-Willem Keinke

6 min. read
Placeholder for Service providersService providers

Telecoms 2018 report: Respondents mark security as biggest perceived threat to industry

This month Telecoms.com published their Annual Industry Survey report. With over 1000+ responses from telecoms professionals, the report is a good reality check on the Telecom industry and provides a sober (and optimistic) look into the coming era of the industry.

1 min. read
Placeholder for Media broadcastingMedia broadcasting

Global media company transforms network security with visibility and Network Access Control (NAC)

Infradata supports a leading media company to strengthen the security of the network through Network Access Control (NAC). With this security solution, the security policy for access to the entire network as well as endpoint security is greatly improved.

1 min. read
Placeholder for Street by night5Street by night5

6 cybersecurity trends you need to know for 2019

With the continuous growth of new emerging technologies and innovative Cyber Security solutions being developed, we asked our Cyber Security experts: What are the 6 cyber security trends for 2019 to watch?

1 min. read
Placeholder for Sun citySun city

European Commission unites on Cybersecurity Act

With nearly 40 percent of EU companies having no Incident Response Plan in place, and only 69 percent of EU companies having no or only a basic understanding of their exposure to cyber risks.

1 min. read
Placeholder for Arista networks background2Arista networks background2

Arista to Demonstrate Any Cloud Networking for Kubernetes at KubeCon NA 2018

New solution uses Arista virtual and cEOS software instances to provide a uniform enterprise-class/cloud-grade routing platform with enhanced visibility and security features tied into OpenShift and Calico commercial enterprise platforms from Red Hat and Tigera.

1 min. read
Placeholder for ForcepointForcepoint

Forcepoint Reveals Cyber Security Predictions for 2019

Forcepoint launched its Forcepoint Cyber Security Predictions 2019 Report . The report provides guidance on the sophisticated threats facing organizations in the months to come.

1 min. read
Placeholder for Junos 10 tipsJunos 10 tips

Symantec and Fortinet Partner to Deliver Cloud Security Service

Symantec and Fortinet announced an expansive partnership agreement today to provide customers with comprehensive and robust security solutions.

1 min. read
Placeholder for Juniper networks securityJuniper networks security

Manage Cyber Threats from any Source with new Data Integration by Juniper Networks

Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources to offer enterprises a fast, flexible and automated defense against malicious activity

1 min. read
Placeholder for Engineers manufacturingEngineers manufacturing

Pulse Secure expands Firewall Auto-provisioning and Behavioral Analytics for IIoT Security

Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories.

1 min. read
Placeholder for Fortinet firewallFortinet firewall

Fortinet Introduces New Security Automation Capabilities on Amazon Web Services

Fortinet announced the expansion of its Fortinet Security Fabric offerings and new automation capabilities for AWS to provide streamlined and consistent security management for hybrid infrastructures.

1 min. read
Placeholder for Street by nightStreet by night

Mirai: Not Just For IoT Anymore

Botmasters have taken the lessons from developing Internet of Things (IoT) malware and shifted their focus to targeting commodity Linux servers. Like many IoT devices, unpatched Linux servers linger on the network, and are being abused at scale by attackers sending exploits to every vulnerable server they can find.

1 min. read
Placeholder for CrowdstrikeCrowdstrike

CrowdStrike gets highest score in Gartner peer insights customer's choice Endpoint Protection Platform

CrowdStrike Falcon receives high score of 4.8 out of 5 based on highest user satisfaction among Endpoint Protection Platform vendors

1 min. read
Placeholder for Night city streetNight city street

2018 Holiday Season Mobile Malware Attacks Are Prevalent

Fortinet Threat Report Reveals Over One-quarter of Organizations Experienced a Mobile Malware Attack. Read more about the 2018 Cyber Security report by Fortinet here.

1 min. read
Placeholder for Honey jar blogHoney jar blog

Dipping into the honeypot

Brute-forcing factory default usernames and passwords is a winning strategy for Internet of Things (IoT) botnet propagation. Research Analyst Matthew Bing dives into the details of IoT botnets.

1 min. read
Placeholder for Fortinet firewallFortinet firewall

Fortinet expands OT Security with new additions to fabric-ready partner ecosystem

Nozomi networks joined by three new operational technology partners: RAD, Indegy and SecurityMatters.

1 min. read
Placeholder for DatacenterDatacenter

The road to next level Data Loss Prevention

Data leaks happen constantly to many different organizations. We have examples of cases in which credit card data of hundreds of thousands of users was leaked, or disgruntled workers that copy sensitive data of the organization they want to leave, to later publish or sell that information in the external world, damaging users and businesses. There is no limit to the amount of data that can be leaked, nor to the amount of damage that can be done.

1 min. read
Placeholder for Partner meetingPartner meeting

Raising Cyber Threat and Cyber Security awareness in 2019

We asked our Cyber Security expert Remco Hobo what challenges businesses are facing when it comes to raising Cyber Threat and Cyber Security awareness.

1 min. read
Placeholder for LondonLondon

UK Government launches Code of Practice for IoT Security

The UK department for Digital, Culture, Media and Sport has launched a Code of Practice for consumer IoT security. The aim of the Code of Practice is to "support all parties involved in the development, manufacturing and retail of consumer IoT", as stated on the UK.gov website.

1 min. read
Placeholder for Smartphone closeupSmartphone closeup

Why Mozilla Firefox's upcoming DoH update might be a mistake

"DoH does not solve a real problem. Contrary, it creates a problem." In his blog solution architect Hilmar Burghraaff dives into the potential risks of Mozilla moving DNS to HTTP over DNS.

1 min. read
Placeholder for Falcon x banner bgFalcon x banner bg

Gartner and Forrester position Crowdstrike leader in endpoint security

Crowdstrike's cloud-delivered Endpoint protection solutions have been named a leader by Forrester and leads the visionary quadrant in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms.

1 min. read
Placeholder for SplunkSplunk

Splunk expert review: Big Data analytics and Cyber Security

Splunk review: Splunk gathers, indexes, and correlates every type of data in real time to generate graphs, dashboards, warnings, and reports – all aligned with your business’s management needs.

1 min. read
Placeholder for Infradata boulderingInfradata bouldering

7 best practices for cloud security

Securing your on-site environment becomes a highly complex challenge if you make use of additional cloud solutions. You're reluctant to write off your existing investments, although at the same time you realize that additional measures must be implemented. Read more about (multi-)cloud security best practices.

1 min. read
Placeholder for F5 networksF5 networks

F5 Networks

F5 launches SSL Orchestrator and Access Manager security products

SSL Orchestrator is a dedicated security appliance that delivers insights to mitigate threats traversing the network. F5 Access Manager protects sensitive data with a Zero Trust model.

1 min. read
Placeholder for Tunnel traffic nightTunnel traffic night

The 5 best Cyber Security solutions of 2018

Learn about the five best cyber security solutions of 2018 so far, that utilize automation, artificial intelligence, and machine learning - to create the most robust security posture possible.

1 min. read
Placeholder for Tunnel traffic nightTunnel traffic night

Top 5 NGFW Firewall Vendors 2018

Next-generation firewalls are essential to IT security. We review 5 of the best.

1 min. read
Placeholder for F5 networks big ipF5 networks big ip

F5 Networks

Research report names F5’s Web Application Firewall a leading solution

F5's WAF solution in top three of The Forrester Wave™ WAF Q2 2018 report. Out of ten Web Application Firewall vendors evaluated, F5 was one of three companies placing in the Leaders category for their application security solutions.

1 min. read
Placeholder for Falcon product new banner bg 01Falcon product new banner bg 01

CrowdStrike

CrowdStrike Announces $1 Million Breach Prevention Warranty

Although many industries have long offered product warranties to assure customers the products they purchase will function as advertised, this has not been true for cybersecurity.

1 min. read
Placeholder for RotterdamRotterdam

Kaspersky Lab Affair

The Dutch authorities recently announced that they are to stop using Kaspersky Labs’ end point security solutions, and were quickly followed by other major critical infrastructure providers. So what has driven this decision and what can we learn from it?

1 min. read
Placeholder for Juniper networks primary marqueeJuniper networks primary marquee

Secure and Automated Multicloud for any cloud, workload and deployment

Juniper Networks delivers orchestration and analytics for any cloud, any workload.

1 min. read
Placeholder for CrowdstrikeCrowdstrike

A trifecta of new security solutions from CrowdStrike

We are extremely excited to announce the Spring Platform Release — a trifecta of new security solutions.

1 min. read
Placeholder for Street by nightStreet by night

From start-up to scale-up, and beyond…

It wasn’t so very long ago that the FTSE 500 was a pretty predictable patch. Most of the companies that made the cut had been in existence for up to 75 years, and having achieved their status they clung onto it. Newcomers were few and far between in this most exclusive of clubs.

1 min. read
Placeholder for Street by nightStreet by night

Palo Alto Networks

Palo Alto Networks Announces Cloud-Based Logging Service in Europe

Palo Alto Networks announced the launch of its cloud-based Logging Service in Europe.  This service allows customers to collect large amounts of their own security data from the Palo Alto Networks Next-Generation Security Platform, making large scale log collection affordable while addressing data privacy and location needs for many European organizations.

1 min. read
Placeholder for Street by night2Street by night2

Miss you already – why GDPR is the next PPI

If I had a pound for every PPI related advert, email, text or unsolicited phone call I’ve ever received I’d be a wealthy woman, it would certainly amount to more than most actual PPI claims.

1 min. read
Placeholder for Street by night2Street by night2

Meet Petya: the new type of Ransomware that infected the world this week

Over a month after the WannaCry attack, yet another type of Ransomware has resurfaced this week, codename: Petya. Companies have been infected worldwide,

1 min. read
Placeholder for Tokyo metroTokyo metro

Almost three quarters of IT security professionals claim to be better protected, but the cybercriminals are winning the war

Infradata today announced the results of its IT security survey conducted at Infosecurity Europe 2017. According to the IT security professionals who took the survey, 72% of organisations think they are better protected than they were twelve months ago.

1 min. read
Placeholder for Street by night2Street by night2

Functionality, security and how not to become the next NHS casualty

I'm positioning myself as a new kind of hero. I won't wear a cape (my legs are too short) but I am fixing cyber crime once and for all. Sure you could spend millions but you won't be safe.

1 min. read
Placeholder for Japanese cityJapanese city

Infradata Acquires French Network Security Specialist Nomios

Infradata, leading independent Dutch integrator of secure carrier-grade networks, has acquired French network security company Nomios. With this acquisition, Infradata strengthens its capabilities in network security and will be able to expand its activities in the French marketplace.

1 min. read
Placeholder for Milkyway roadMilkyway road

Security Vulnerabilities with Juniper ScreenOS

An unauthorized code in the ScreenOS system is causing illegitimate remote administrative access, and allowing a knowledgeable attacker to monitor and decrypt VPN traffic.

1 min. read
Placeholder for Education classEducation class

Juniper Networks enhances next generation firewall capabilities to simplify and improve security for the enterprise edge

Juniper Networks, industry leader in network innovation, today announced powerful new capabilities in its Next-Generation Firewall (NGFW) solutions for protecting the enterprise edge, offering added security, control and efficiency while being easier to deploy and manage.

1 min. read
Placeholder for Windmills cityWindmills city

Power of DDoS attacks shows spectacular growth

Leiden, April 17th, 2013 – The amount of traffic generated by botnets in the average DDoS attack has multiplied by a factor of 8 in the last three months. In the fourth quarter of 2012 the average DDoS attack generated 5.9 Gbps of traffic.

1 min. read
Placeholder for Power plantPower plant

Infradata about cyber attacks in the NRC Handelsblad

On the 13th of April 2013, Infradata was quoted in the NRC Newspaper based on an interview concerning the recent DDoS attacks in The Netherlands.

1 min. read
Placeholder for Education classEducation class

Infradata supports Ziggo with security migration

Ziggo and network integrator Infradata have joined forced to replace the firewalls in Ziggo’s operational network. After a comprehensive technical selection process, Ziggo opted for the firewall solutions by Juniper Networks and chose Infradata for delivery and implementation.

1 min. read