Becrypt launches Secure Operating Centre service

Providing flexibility for outsourced security monitoring.

  • Sunday, 3rd November 2019 Posted 5 years ago in by Phil Alsop
Becrypt has introduced a new managed Secure Operating Centre (SOC) service targeting both SMEs as well as overstretched teams within larger organisations migrating to cloud.

 

Developed in response to customer demand, the SOC service evolved as existing customers of Becrypt’s managed service offerings required more resource, expertise and automation for security monitoring. With customers increasingly cloud-focused, agile and adopting mixed resourcing models, Becrypt’s existing cloud platforms and expertise can now be consumed as a managed service allowing organisations to fully or partially outsource both commodity IT and security operations to focus on their core business applications.

 

The ongoing adoption of cloud services for many organisations can result in an expansion of IT infrastructure and assets falling outside of existing security monitoring. Becrypt’s new service can complement in-house technology expertise to support IT growth or migration, providing a service that leverages expertise and tools that might otherwise be cost prohibitive. The service is managed by vetted staff and based in Becrypt’s head office in London.

 

Bernard Parsons, CEO at Becrypt, comments: “Data is ubiquitous, employees are mobile and the nature of threats is constantly evolving. We have developed our SOC in order to better support organisations in the proactive identification of threats and to help defend against cyberattacks. What we are also finding is that many resource restricted organisations use our skills to complement their own. Our SOC service helps companies cope with the core demands of business, easing the burden of increasingly relevant and complex cyber threat analysis.”

 

The Becrypt SOC service enables organisations to reduce thousands of security events into a manageable list of suspected anomalies. It detects and tracks malicious activity over extended time periods, helping to uncover persistent threats often missed without proactive monitoring. This means it can help organisations detect insider threats with advanced capabilities as well as enable companies to meet regulatory and security compliance requirements, providing real-time visibility for threat detection and prioritisation.

 

Other key features of the Becrypt SOC include:

 

·         Proactive identification of security incidents and abnormal behaviour

·         Provides information for remediation and root cause analysis

·         Improved communication and understanding of Security Information Event Management (SIEM) requirements

·         A mechanism to help improve customer regulatory compliance and security posture

·         Reporting of security metrics including adherence to internationally recognised standards for Information Security Management

·         Helps customers focus on their core business deployment scenarios