This resource is no longer available

Creating an Effective Security Operations Function

Cover
When we think of a security operations center (SOC), we often have an image of a large room, full of people sitting in neat rows, with their attention split between their desktop monitors and a big screen up-front. In many organizations, however, the reality is quite different. While almost every enterprise has a security operations function, it can take many forms. In some cases, it's a formally designated group, with dedicated staff and facilities. In other cases, security operations consist of just a handful of people with multiple responsibilities who deal with IT security problems as they arise. Read this white paper to understand all the activities and roles in a security operations function. It's the first step in making those operations more effective and efficient - allowing you to leverage your related technology investments and human expertise to best advantage.
Vendor:
RSA, The Security Division of EMC
Posted:
17 Oct 2008
Published:
16 Oct 2008
Format:
PDF
Length:
8 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.