
These technologies are leveraged in the modern SOC to reduce the attack profile of websites and web applications, and gather higher quality data about legitimate and malicious traffic hitting critical web properties.

A WAF can detect attacks while minimizing false positives, by learning acceptable URLs, parameters and user inputs, and uses this data to identify traffic or inputs that deviate from the norm. WAF-a WAF is deployed in front of web applications, inspects traffic and identifies traffic patterns that may represent malicious activity.They use a reverse proxy to terminate connections and inspect content before it reaches a web server. NGFWs can block threats at the network edge using techniques like URL filtering, behavioral analysis and geolocation filtering. NGFW-extends the firewall by providing intrusion prevention and intrusion detection with deep packet inspection capabilities.Two new technologies are complementing or replacing the traditional firewall: Firewalls, Next-Generation Firewalls (NFGW) and Web Application Firewalls (WAF)įirewalls are a standard part of any cybersecurity arsenal. A SIEM functions as a “single pane of glass” which enables the SOC to monitor enterprise systems. The SIEM uses correlation and statistical models to identify events that might constitute a security incident, alert SOC staff about them, and provide contextual information to assist investigation. The foundational technology of a SOC is a SIEM system, which aggregates system logs and events from security tools from across the entire organization. Security Information and Event Management (SIEM)
