ISLANDIA, N.Y. – Managing security events in today’s corporate environment

poses a series of challenges for beleaguered IT personnel

and their organizations. A daily onslaught of security

data from disparate systems, platforms and applications

delivers the first challenge.

Numerous point solutions such as antivirus software, firewalls, intrusion prevention systems, intrusion detection, access control, identity

management, single sign-on, authentication systems all

present information in different formats, store it in

different places and report to different locations.

Most organizations deal with literally millions of messages daily

from these incompatible security technologies, resulting

in security information overload which, in turn, contributes

to high overhead, duplication of effort, weak security

models and failed audits.

In a recent survey, almost half of the security administrators asked, could not determine how many critical security events required action in the

past month as a result of this issue.3 And according to

Forrester Research, ?Security products available today for

the perimeter, such as firewalls, IPSs, intrusion detection,

antivirus gateways, content filtering, and a host of

multipurpose security appliances, are making the network

perimeter much more resilient ? but also more

complicated.

As if this weren?t enough, other challenges add complexity

to the situation. Attacks are becoming increasingly more

frequent and sophisticated, pushing existing security

capabilities to the limit. New technologies and the rapid

expansion of networks and services indicate that this

information overload will only worsen. Finally, regulatory

compliance issues place an increasing burden on systems

and network administrators.

In the face of such overwhelming odds, how can you

ensure that your vital business assets and operations are

protected? How do you guarantee privacy for your

employees, partners, vendors and customers? How do you

implement security policies? How do you get a handle on

the vast amounts of data and on the incompatible

technologies and devices that, while standing guard,

generate an entire new set of challenges? How do you

maintain accountability and corporate governance within

the organization?

To redress the current fragmented approach to security

event management and safeguard your business

operations, security administrators require the kind of

real-time, centralized integration and management

capabilities associated with today?s Network Operation

Centers (NOCs). Security Operation Centers (SOCs) can

provide a real-time view into a network?s security status,

making a proactive approach to security a reality via

automated alerts, detailed reports, and remediation.

A SOC monitors and manages all aspects of enterprise

security in real time, from a single, centralized location.

It discovers and prioritizes events, determines risk level

and which assets are affected, and recommends and/or

executes the appropriate remediation solution. It delivers

detailed reports at the local and network levels, meeting

both real-time management and audit requirements.

To provide an example of a SOC in action, imagine a

security administrator sitting in a room at a Colorado

University; the room is lit by the glow of several computer

monitors each displaying physical areas of the campus.

Each monitor is presenting data that is reporting from

the distributed geographic sites of the University.

The administrator receives an alert on their main screen,

clicks a button and then picks up the phone and puts in a

call to a local operator in California. What happened?

The administrator saw proprietary information being sent

out of the University improperly, the user?s access was

locked out, the local operator was dispatched to remove

the user from the building and an investigation into the

incident was initiated. This sounds a bit futuristic ? but

it?s not ? this is the reality of today?s SOC.

In this paper, we explore the business and technical

requirements that organizations must consider when

implementing a SOC.

What Does a Security Operations Center Do

A properly configured and managed SOC acts as an

intelligent brain gathering data from all areas of a network,

automatically sifting through alerts, prioritizing the risks

and preventing attacks before they can be executed and

cause costly damage.

The key to the SOC is to provide situational awareness ?

a correlated picture of what is occurring right now in an

enterprise. By pulling together information from a variety

of devices (firewalls, antivirus, intrusion detection

systems, etc.) then normalizing and correlating the

information, the SOC provides real-time (or near realtime)

reporting on what is happening so that operators

can manage and respond to intrusions before they put the

organization at risk; when complete prevention is not

possible, the SOC reporting allows operators to identify

attacks and limit the damage before it spreads.

Many organizations have already deployed NOCs that

manage and monitor the network traffic, however still lack

a method for centralized management of security events3.

The primary function of the NOC is to establish and

maintain the health and wellness of an organization?s

infrastructure. A NOC concentrates on keeping the

network running while a SOC manages security events to

protect the network. According to the Yankee Group,

Security Information Management ??is evolving by

converging with network and systems management.

Organizations are looking to increase efficiency by

implementing security systems with greater autonomy to

respond to virus infections, attacks or other losses of

network integrity.

While a SOC and a NOC can work as

completely separate entities they work

more effectively when used in tandem.

A SOC can feed information to a NOC for resolution of a

security event.

The integration of the SOC and NOC allows organizations

to quickly respond to security events. NOCs can leverage

network activity in addition to the real-time security

event data to avert security incidents, while the SOC

can similarly leverage network activity related to security

events to further refine the identification of a specific

security event. Additionally, this integration enables

communication between the NOC and SOC offering a

central console for network and security situational

awareness allowing organizations to quickly identify,

respond and mitigate security events across the

organization.

Why ?After the Fact? is Too Late

The phrase ?forewarned is forearmed? sums up the value

of situational awareness. Simply put, being aware is about

being prepared to act and respond. This concept in the

IT world is analogous to the physical world?s notion of

obtaining a regular physical at the doctor?s office. When

we visit the doctor, tests are run to monitor our current

state of health and if anomalies are detected ? action is

recommended.

As an example, a suspicious mole may

indicate skin cancer. A biopsy is taken and the mole is

removed before further harm can occur. Contrast this with

a patient who has not visited the doctor, is unaware the

mole is present resulting in a condition in which the cancer

has spread throughout the body. Diagnosis and response to

the situation early on potentially saves the patients life

rather than responding too late to the threat with dire

consequences.

We can look at a similar example, but from an IT security

perspective. Threats to the network environment occur

hundreds of times a day and are detected by intrusion

detection systems, antivirus systems, firewalls, system logs

and access logs. Many IT organizations struggle to compile

the resources needed to review the data coming from all of

these systems. IT m