This resource is no longer available
Creating an Effective Security Operations Function
When we think of a security operations center (SOC), we often have an image of a large room, full of people sitting in neat rows, with their attention split between their desktop monitors and a big screen up-front. In many organizations, however, the reality is quite different. While almost every enterprise has a security operations function, it can take many forms. In some cases, it's a formally designated group, with dedicated staff and facilities. In other cases, security operations consist of just a handful of people with multiple responsibilities who deal with IT security problems as they arise. Read this white paper to understand all the activities and roles in a security operations function. It's the first step in making those operations more effective and efficient - allowing you to leverage your related technology investments and human expertise to best advantage.
- RSA, The Security Division of EMC
- 17 Oct 2008
- 16 Oct 2008
- 8 Page(s)
- White Paper