{"id":11826,"date":"2019-04-18T10:00:30","date_gmt":"2019-04-18T09:00:30","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11826"},"modified":"2020-01-02T15:29:25","modified_gmt":"2020-01-02T14:29:25","slug":"new-tools-soc-13","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/","title":{"rendered":"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3)"},"content":{"rendered":"<p><em>SOC teams are finding it more and more difficult to detect increasingly complex attacks that take place over ever larger perimeters. At the same time, they are bearing the full brunt of the explosion in the number of alerts to process (especially due to the myriad of technologies in use and the false positives they generate), the strengthening of the regulatory framework, and the need for more granular and rapid detection&#8230;<\/em><\/p>\n<p><em>Against a backdrop of an acute shortage of cybersecurity skills, these issues cannot be addressed solely by increasing the size of SOC teams. The use of <strong>new tools<\/strong>, based on <strong>four strategic areas<\/strong>, is essential in enabling SOCs to stay ahead of threats.<\/em><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-11844 media-11844\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11844 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image-0-1.png\" alt=\"\" width=\"1464\" height=\"318\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image-0-1.png 1464w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image-0-1-437x95.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image-0-1-768x167.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image-0-1-71x15.png 71w\" sizes=\"auto, (max-width: 1464px) 100vw, 1464px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p><em>Here, <strong>extending the scope of detection<\/strong> enables the protection of new areas of the IS that are not sufficiently secure (such as the cloud) and of resources that are increasingly being chosen as targets (through ransomware attacks on terminals, targeted attacks using ADs, etc.).<\/em><\/p>\n<p><em>At the same time, <strong>new approaches need to be adopted<\/strong> to detect targeted attacks (0-day, &#8220;low signal&#8221;, etc.), whose increasing sophistication is undermining existing security measures.<\/em><\/p>\n<p><em>In addition to these new detection tools, <strong>an<\/strong> <strong>advanced knowledge of threats<\/strong> <strong>and attackers<\/strong> can improve existing detection capabilities, help prioritize incidents to be dealt with, and increase the effectiveness of the response.<\/em><\/p>\n<p><em>But SOC teams are already struggling to process the events generated by existing tools. As a result, it\u2019s essential to <strong>standardize and automate<\/strong> interactions between teams and systems, and, wherever possible, <strong>the sequence of analysis and response<\/strong>.<\/em><\/p>\n<p><strong><em>Follow our series on the topic and learn how to tool up in these four strategic areas!<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Extending the scope of detection to new perimeters<\/h2>\n<h3>A unique solution to secure all clouds: CASB<\/h3>\n<p>Cloud Access Security Brokers (CASBs) address an area of the IS that is poorly served by traditional security measures: <strong>the cloud<\/strong>. The very nature of the cloud means that protection in this area requires a different approach to that used for a conventional IS;\u00a0<strong>there is little or no control of resources<\/strong> (infrastructure, OSs, or applications\u2014depending on the type of offering), <strong>assets are located outside the IS<\/strong>, etc.<\/p>\n<p>CASBs aim to <strong>centralize <\/strong>and <strong>ensure that security policies are applied<\/strong>. Some <strong>cloud providers offer their own<\/strong> CASB security services (for example, Microsoft\u2019s <em>Cloud App Security<\/em>); but, depending on the needs, it may be preferable to use <strong>third-party solutions<\/strong>, even though there is a cost to adding in another player. While CASBs aim to ensure security levels in the cloud, relying on the cloud service providers to perform this monitoring role can be counterproductive: it\u2019s preferable to make use of a &#8220;trusted third party&#8221;.<\/p>\n<p>In all cases, CASBs offer a diversity of solutions that can include a very large number of services\u2014their degree of maturity depending on the solution&#8217;s publisher, the cloud provider, and the type of hosting (IaaS, PaaS, SaaS, etc.).<\/p>\n<p>On the one hand, CASB solutions make it possible to deal with <strong>specific cloud issues<\/strong>, by <strong>addressing the lack of visibility in these environments<\/strong> (through shadow IT detection, usage statistics, etc.) and ensuring that they are <strong>compliant<\/strong> (verification of configurations, etc.).<\/p>\n<p>On the other hand, they play a part in the application of traditional security measures in this cloud. In particular, <strong>data security<\/strong> issues (such as DLP and encryption measures, which are of special concern to regulators) and <strong>threat detection<\/strong> (centralization of cloud logs for transmission to SIEM, detection of abnormal behavior using UEBA (see our dedicated article on this), etc.) are parts of a CASB traditional capabilities. In addition, some stakes associated with <strong>IAM<\/strong> can also be addressed by these solutions (SSO, access contextualization, etc.).<\/p>\n<p>There are two main modes of deployment when putting these features in place, each with its advantages and disadvantages. <strong>Proxy-type<\/strong> <strong>solutions<\/strong> are placed between users and the cloud service.<\/p>\n<p>In contrast, when using <strong>API-type solutions<\/strong>, which are sometimes called \u201cout-of-band\u201d, the cloud service\u2019s consumers communicate directly with it. Each time it\u2019s accessed, the service queries the CASB\u2019s APIs to evaluate the risks and authorize (or prohibit) the consumption of the service. However, to operate, API solutions rely on the interfaces offered by the cloud provider, which may limit the options.<\/p>\n<p>At present, CASBs are relatively new and immature solutions, and their deployment is limited. However, given the increasingly broad adoption of cloud services (already well advanced), CASBs undoubtedly have a bright future. They\u2019ll enable SOC teams to extend their surveillance to this area, which will soon represent a large proportion of any IS.<\/p>\n<p><strong><u>Examples of CASB publishers:<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-11827 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image1-437x119.png\" alt=\"\" width=\"437\" height=\"119\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image1.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image1-71x19.png 71w\" sizes=\"auto, (max-width: 437px) 100vw, 437px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>The new Swiss army knife for securing terminals: endpoint detection and response (EDR)<\/h3>\n<p>Endpoint Detection and Response (EDR) solutions are set to enhance SOC\u2019s detection and response capabilities <strong>for terminals<\/strong> (PCs, servers, etc.).<\/p>\n<p>As the name implies, EDRs play a part in <strong>detecting<\/strong> attacks. In fact, they are plugging the gaps in anti-virus solutions (and other HIPSs) which make use of specific attack signatures and are therefore unsuited to detecting certain attack types\u2014in particular advanced attacks (APTs). EDRs are based on other detection methods, with publishers generally offering a combination of techniques commonly used elsewhere.<\/p>\n<p>Among these techniques, a large number of solutions <strong>detect the exploitation of known vulnerabilities<\/strong> or <strong>attack patterns<\/strong> (the opening of suspicious ports to dubious addresses, etc.), the <strong>analysis of files<\/strong> using a sandbox (local emulation, submission in the cloud, etc.), and <strong>behavioral approaches<\/strong> based on Machine Learning (in particular UEBA solutions\u2014see the dedicated chapter on this). Depending on the SOC\u2019s needs, the alerts produced can be integrated as SIEM sources, or made available directly from the solution management console.<\/p>\n<p>In addition to their advanced detection capabilities, EDR solutions also result in a considerable <strong>increase in visibility on devices<\/strong>: lists of processes and services launched, lists of files in certain system directories, as well as other information that <strong>facilitates investigation<\/strong> in cases where an alert is raised. Some solutions go beyond mere recovery of the state of the terminal at the time of the request, enabling its history to be recovered too: generation of logs, recovery of deleted files, etc.<\/p>\n<p>But EDRs\u2019 features don\u2019t end at the detection and analysis phase. In fact, these solutions enable <strong>remote remediation<\/strong> actions to be performed, and the complexity of these depends on the publisher: deleting or quarantining files, ending processes, quarantining the terminal from the network, modifying registry keys, etc.<\/p>\n<p>EDRs, thus, are comprehensive solutions that come into play at every stage of the process: from detection, through analysis, to response. However, they are <strong>not intended to replace anti-virus solutions<\/strong>: it\u2019s always more effective to block known attacks, even though publishers are increasingly offering solutions that combine these two types of functionality.<\/p>\n<p><em>For more details on EDR solutions, read our dedicated article <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/03\/edr-nouveau-challenger-dans-la-protection-des-endpoints\/\">here<\/a>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong><u>Examples of EDR publishers:<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-11829 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/Image2-1-333x191.png\" alt=\"\" width=\"333\" height=\"191\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/Image2-1.png 333w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/Image2-1-120x70.png 120w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/Image2-1-68x39.png 68w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Protecting the keys to the kingdom: Active Directory supervision<\/h3>\n<p>Directories are among an <strong>IS\u2019s<\/strong> <strong>most critical<\/strong> components. They provide the authentication and authorization functionality for almost all IS resources\u2014both technical and business function\u2014including the most critical ones. It\u2019s therefore not surprising that compromising the AD is one of the most frequent attack methods used, since it opens numerous doors to an attacker.<\/p>\n<p>Despite this criticality, and the fact that AD architectures are well known and have evolved little in recent years, <strong>their security has scope to improve<\/strong>. This is due, in particular, to their specific mode of operation (OUs, domains, trees, forests, users, etc.), which renders traditional protection and surveillance methods ineffective; a significant concern given that any vulnerability can represent a major risk for the rest of the IS.<\/p>\n<p>AD surveillance solutions aim to overcome this problem by supervising (in real time, or during an audit) the specificities of directories (configuration, status of accounts, etc.) and <strong>detecting vulnerabilities <\/strong>that could result in them being compromised. To do this, AD supervision solutions have a highly detailed knowledge of how ADs function, and, in particular, the associated security issues.<\/p>\n<p>When the solution detects a vulnerability, <strong>it raises an alert<\/strong> (via the SIEM, or directly) and can provide <strong>remediation advice<\/strong> to facilitate the work of the teams responsible for rectifying the problem.<\/p>\n<p>AD supervision tools also enable the SOC to <strong>detect any changes in configuration<\/strong> (legitimate, accidental, or malicious) and continuously assure security levels for these critical components. In doing so, they make the task of numerous attackers decidedly more complex.<\/p>\n<p>In addition to directly strengthening the AD\u2019s security levels, such solutions can also be used to ensure <strong>compliance with standards or regulatory requirements<\/strong> (for example PCI DSS, etc.).<\/p>\n<p>These solutions are not widely applied today, and their use is generally limited to one-off audits. However, given the considerable security improvements associated with the provision of detection and remediation advice, and their ease of use, such solutions have strong potential and are likely to find their place among the tools used by SOCs.<\/p>\n<p><strong><u>Examples of AD supervision publishers:<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-11831 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image3-1-437x111.png\" alt=\"\" width=\"437\" height=\"111\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image3-1.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/04\/image3-1-71x18.png 71w\" sizes=\"auto, (max-width: 437px) 100vw, 437px\" \/><\/p>\n<p><em>You can find our second article in the series <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-23\/\">here<\/a>.<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SOC teams are finding it more and more difficult to detect increasingly complex attacks that take place over ever larger perimeters. At the same time, they are bearing the full brunt of the explosion in the number of alerts to&#8230;<\/p>\n","protected":false},"author":1297,"featured_media":10927,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3273],"tags":[3121,3122,3123,3124,3125,3126,3127,3120],"coauthors":[2886],"class_list":["post-11826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response-en","tag-ad-en","tag-casb-en","tag-detection-en","tag-edr-en","tag-innovation-en","tag-soc-en","tag-supervision-en","tag-tool"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3) - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"SOC teams are finding it more and more difficult to detect increasingly complex attacks that take place over ever larger perimeters. At the same time, they are bearing the full brunt of the explosion in the number of alerts to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-18T09:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T14:29:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"5000\" \/>\n\t<meta property=\"og:image:height\" content=\"3000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amaury Coulomban\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amaury Coulomban\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/\"},\"author\":{\"name\":\"Amaury Coulomban\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7a79197b594ac11df87325cd14be6eef\"},\"headline\":\"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3)\",\"datePublished\":\"2019-04-18T09:00:30+00:00\",\"dateModified\":\"2020-01-02T14:29:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/\"},\"wordCount\":1516,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg\",\"keywords\":[\"AD\",\"CASB\",\"d\u00e9tection\",\"EDR\",\"innovation\",\"SOC\",\"supervision\",\"tool\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/\",\"name\":\"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg\",\"datePublished\":\"2019-04-18T09:00:30+00:00\",\"dateModified\":\"2020-01-02T14:29:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg\",\"width\":5000,\"height\":3000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7a79197b594ac11df87325cd14be6eef\",\"name\":\"Amaury Coulomban\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/amaury-coulomban\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3) - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/","og_locale":"en_US","og_type":"article","og_title":"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3) - RiskInsight","og_description":"SOC teams are finding it more and more difficult to detect increasingly complex attacks that take place over ever larger perimeters. At the same time, they are bearing the full brunt of the explosion in the number of alerts to...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/","og_site_name":"RiskInsight","article_published_time":"2019-04-18T09:00:30+00:00","article_modified_time":"2020-01-02T14:29:25+00:00","og_image":[{"width":5000,"height":3000,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg","type":"image\/jpeg"}],"author":"Amaury Coulomban","twitter_misc":{"Written by":"Amaury Coulomban","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/"},"author":{"name":"Amaury Coulomban","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7a79197b594ac11df87325cd14be6eef"},"headline":"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3)","datePublished":"2019-04-18T09:00:30+00:00","dateModified":"2020-01-02T14:29:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/"},"wordCount":1516,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg","keywords":["AD","CASB","d\u00e9tection","EDR","innovation","SOC","supervision","tool"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/","name":"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg","datePublished":"2019-04-18T09:00:30+00:00","dateModified":"2020-01-02T14:29:25+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/06\/Fotolia_74362160_Subscription_Monthly_XXL-vector-business-teamwork-meeting-and-brainstorm\u00a9-apinan.jpg","width":5000,"height":3000},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/04\/new-tools-soc-13\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"SOAR, UEBA, CASB, EDR and others: which tools do you need for you SOC? (1\/3)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/7a79197b594ac11df87325cd14be6eef","name":"Amaury Coulomban","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/amaury-coulomban\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11826"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11826\/revisions"}],"predecessor-version":[{"id":11848,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11826\/revisions\/11848"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/10927"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11826"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}