O'Reilly logo

Security Operations Center: Building, Operating and Maintaining your SOC by Joey Muniz, Nadhem AlFardan, Gary McIntyre

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. The Technology

“Technology is the campfire around which we tell our stories.”—Laurie Anderson

Now that you know about the people and processes, it is time to review the technology used by security operations center (SOC) teams around the world. This chapter focuses on what SOC architects should consider as they evaluate different technologies. The chapter covers best practice considerations for designing high-level categories such as network, security, systems, collaboration, and storage. The chapter then goes deeper into design considerations for products found in most SOC environments. The chapter wraps up with SOC architectures that bring together all the technologies covered.

Before evaluating technologies, let’s first review the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required