In addition, the security department will demand more respect when it projects a positive image, rather than one that lives in a cluttered hole-in-the-wall. It should be remembered that efficiency and productivity are related, and that security’s image can be enhanced by a well-designed work environment. The counter argument is that the SOC needs to remain operational throughout a myriad of threat scenarios and may be best located in a more secure environment, away from traffic. A number of years ago, it was argued in a court case that an organization had not given security the prominence that it should since the security operation was located in the building basement. Its attributes usually depend on the importance given to security within the organization. The monitoring location can either be the pride of the physical security operation, or a space more reminiscent of the Black Hole of Calcutta. The user could be a landlord or tenant and the SOC could be responsible for multiple tenants or for many locations of a single company. This article outlines the design criteria to be considered in the development of a proprietary security systems monitoring and administration environment. In this context, it refers to a Security Operations Center (SOC) located at the user’s premises (in contrast to a commercial central alarm station) and usually owned and operated by the user.īuilding an in-house SOC presents a myriad of challenges, and many security groups struggle on how to best start. The adjective “proprietary” is used in the security industry to describe a number of different attributes - some good and some not as much. There may be unique business requirements that require a dedicated, “proprietary” SOC - such as a casino or very large campus environment - or there may be cost drivers that indicate the need for an in-house SOC. Faced with the decision to stay in-house or used a managed services provider, many large organizations have decided to keep security under their own roof and build their own Security Operations Center (SOC) to correlate events and centralize all security monitoring and functions.
0 Comments
Leave a Reply. |