SOC - DEEP
SOC
How do correlation strategies work within an SOC?
Phishing, ransomware… cyber-attacks against businesses have surged this year. To protect against them, more and more businesses are choosing to set up an SOC: Security Operations Centre.
Read this articlePublished on
20 October 2020
Make the SOC more efficient with the help of an orchestrator
With any cyber threat, a rapid response is essential. The use of an orchestrator at the SOC, based on the automation possibilities offered, makes it easier to monitor alerts and take quicker decisions when facing a cyber risk.
Read this articlePublished on
01 January 1970
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expert







Our experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?