Becrypt launches Secure Operating Centre service

Providing flexibility for outsourced security monitoring.

  • 4 years ago Posted in
Becrypt has introduced a new managed Secure Operating Centre (SOC) service targeting both SMEs as well as overstretched teams within larger organisations migrating to cloud.

 

Developed in response to customer demand, the SOC service evolved as existing customers of Becrypt’s managed service offerings required more resource, expertise and automation for security monitoring. With customers increasingly cloud-focused, agile and adopting mixed resourcing models, Becrypt’s existing cloud platforms and expertise can now be consumed as a managed service allowing organisations to fully or partially outsource both commodity IT and security operations to focus on their core business applications.

 

The ongoing adoption of cloud services for many organisations can result in an expansion of IT infrastructure and assets falling outside of existing security monitoring. Becrypt’s new service can complement in-house technology expertise to support IT growth or migration, providing a service that leverages expertise and tools that might otherwise be cost prohibitive. The service is managed by vetted staff and based in Becrypt’s head office in London.

 

Bernard Parsons, CEO at Becrypt, comments: “Data is ubiquitous, employees are mobile and the nature of threats is constantly evolving. We have developed our SOC in order to better support organisations in the proactive identification of threats and to help defend against cyberattacks. What we are also finding is that many resource restricted organisations use our skills to complement their own. Our SOC service helps companies cope with the core demands of business, easing the burden of increasingly relevant and complex cyber threat analysis.”

 

The Becrypt SOC service enables organisations to reduce thousands of security events into a manageable list of suspected anomalies. It detects and tracks malicious activity over extended time periods, helping to uncover persistent threats often missed without proactive monitoring. This means it can help organisations detect insider threats with advanced capabilities as well as enable companies to meet regulatory and security compliance requirements, providing real-time visibility for threat detection and prioritisation.

 

Other key features of the Becrypt SOC include:

 

·         Proactive identification of security incidents and abnormal behaviour

·         Provides information for remediation and root cause analysis

·         Improved communication and understanding of Security Information Event Management (SIEM) requirements

·         A mechanism to help improve customer regulatory compliance and security posture

·         Reporting of security metrics including adherence to internationally recognised standards for Information Security Management

·         Helps customers focus on their core business deployment scenarios

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...