SOC (Security Operation Center)
In the past
the idea was to have PCs, considered “weak” devices, protected by the company’s IT infrastructure (ICT) with tools such as firewalls and VPNs. This protection barrier, often represented by a blue rectangle, typically served as a physical perimeter. However, this wall is extremely fragile and can be breached when surfing the internet, using new connectivity software like AnyDesk, or introducing unknown software into the company via laptops of visitors.
For this reason, we prefer to use another approach:
strengthening individual devices and PCs. At this point, the presence of an outer protective wall becomes less important.
But what strengthens a PC or device? Three key elements:
1. Monitoring: This function ensures the proper functioning of the PC or device.
2. Asset Management: This involves knowing exactly what hardware and software are on the device to automatically update software and minimize vulnerabilities.
3. Endpoint Protection: This includes both antivirus and internet access protection.
As a result, all PCs and devices of a company or organization are no longer confined to a physical perimeter at a specific location. Instead, they are all managed and controlled by a single operations center, a single control function, a single SOC (Security Operations Center).
Question: If we have set up this SOC for a company or organization, is it still necessary to have strong perimeter walls or protections?
Answer: Yes, because there are many devices within the company on which SOC service agents cannot be installed. Therefore, there is still a need for some form of perimeter protection.