Creating an Effective Security Operations Function
sponsored by RSA, The Security Division of EMC

When we think of a security operations center (SOC), we often have an image of a large room, full of people sitting in neat rows, with their attention split between their desktop monitors and a big screen up-front. In many organizations, however, the reality is quite different. While almost every enterprise has a security operations function, it can take many forms. In some cases, it's a formally designated group, with dedicated staff and facilities. In other cases, security operations consist of just a handful of people with multiple responsibilities who deal with IT security problems as they arise. Read this white paper to understand all the activities and roles in a security operations function. It's the first step in making those operations more effective and efficient - allowing you to leverage your related technology investments and human expertise to best advantage.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from RSA, The Security Division of EMC
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement