{"id":37308,"date":"2023-05-25T00:00:00","date_gmt":"2023-05-24T22:00:00","guid":{"rendered":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/"},"modified":"2025-01-13T17:08:44","modified_gmt":"2025-01-13T16:08:44","slug":"what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc","status":"publish","type":"post","link":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/","title":{"rendered":"What requirements do you need to obtain a modern, intelligent and proactive SOC?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;]Cybersecurity has become a critical issue for businesses around the world, and having a Security Operations Center (SOC) service is essential to protect all vulnerable attack surfaces. However, traditional SOCs are no longer able to cover with agility, speed and effectiveness the sophistication of today&#8217;s cyber-attacks and their constant evolution, from ransomware attacks to advanced malware and phishing. Therefore, <strong>the most effective defense approach is to have a modern SOC service in place<\/strong>. A <a href=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/areas-of-expertise\/security\/cibersoc-security-management-and-monitoring\/\" target=\"_blank\" rel=\"noopener\">modern SOC<\/a> monitors and protects 24\u00d77 against all cyber threats to which an organization is exposed, based on 3 fundamental requirements: technologies, processes and infrastructure, and people.  <\/p>\n<h2><span style=\"color: #001689;\">Technologies<\/span><\/h2>\n<h3><span style=\"color: #0067fb;\">Advanced security solutions and tools<\/span><\/h3>\n<p>There are many companies that deploy a SOC without having security solutions deployed, with the objective of obtaining visibility only of the security events of some business assets that they consider critical, for example, some specific servers. But this approach is not the right one because if a serious incident occurs in any of the assets that are not monitored by the SOC, the company will not be aware of it until the incident spreads to the monitored assets, being already too late. <\/p>\n<p><strong>If security solutions are not deployed, the following situations occur:<\/strong><\/p>\n<ol>\n<li>Reduced ability to detect internally occurring threats.<\/li>\n<li>The ability to apply remediation actions to cyber threats is limited to disconnecting the network and local infrastructure; with a great negative impact on the business.<\/li>\n<\/ol>\n<p>Therefore, first of all, it is imperative to have <strong>a high level of security with modern solutions that protect all attack surfaces<\/strong> and that are supported by detection and response tools such as:<\/p>\n<ul>\n<li>Intrusion Detection System (IDS).<\/li>\n<li>Connection point detection and response (EDR) system.<\/li>\n<li>Security Information and Event Management Systems (SIEM).<\/li>\n<li>Security Orchestration, Automation and Response (SOAR) system.<\/li>\n<li>Extended and correlated detection systems on different attack surfaces such as Identities, Applications and data, devices and infrastructure (XDR).<\/li>\n<li>User and entity behavior analysis (UEBA) and machine learning (ML).<\/li>\n<\/ul>\n<p>Only in this way is it possible to obtain a complete defense with <strong>a modern, intelligent and proactive SOC<\/strong> that is able to quickly identify, prevent and mitigate cyber threats.<\/p>\n<h3><span style=\"color: #0067fb;\">Unified security platform<\/span><\/h3>\n<p>It is common for companies to use products and tools from different vendors, so it is necessary to also have a unified security management platform that enables the integration of all security tools and solutions. This helps to <strong>simplify the management and analysis of security data, and to provide complete visibility<\/strong> into enterprise systems and networks. Using security solutions that work under a single ecosystem, such as <strong>Microsoft&#8217;<\/strong>s <strong>cloud security solutions platform<\/strong>, allows us to correlate security events that affect all attack surfaces, so we have more capabilities to detect and investigate threats that may affect the organization. <\/p>\n<h2><span style=\"color: #001689;\">2. Processes and infrastructure<\/span><\/h2>\n<h3><span style=\"color: #0067fb;\">Well-defined processes and scalable infrastructure<\/span><\/h3>\n<p>For the optimal functioning of a modern SOC, it is essential to have a <strong>robust and scalable cloud infrastructure<\/strong> to be able to collect, store, process and analyze large volumes of data, and to have well-defined and documented security processes and policies that establish the responsibilities and protocols to be followed to detect, respond to and mitigate security threats. Therefore, it is also important to foster <strong>collaboration between the SOC&#8217;s specialist team and other departments in the company<\/strong>, which can provide them with relevant information that allows them to better understand how cyber threats can impact the business in order to identify and mitigate risks much better. In addition, the SOC should coordinate with other departments to conduct incident response activities and communicate the results of security investigations to other departments.<\/p>\n<h2><span style=\"color: #001689;\">3. Persons<\/span><\/h2>\n<h3><span style=\"color: #0067fb;\">Multidisciplinary team of cybersecurity experts<\/span><\/h3>\n<p>A modern SOC requires a multidisciplinary team of experts such as security engineers, security analysts, threat hunters, threat intelligence analysts and forensic investigators, with extensive knowledge of technologies for threat detection, prevention and analysis, artificial intelligence and machine learning, as well as the tactics, techniques and procedures of the most advanced threats. Having all these internal resources available in the company is unfeasible in most cases due to high costs, lack of experience and qualified personnel, etc. Therefore, <strong>the most common and intelligent decision is to have a SOC service managed by a<a href=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/max-global-defense\/\" target=\"_blank\" rel=\"noopener\"> partner specialized in cybersecurity <\/a><\/strong>that provides all the necessary resources, personnel and knowledge.<\/p>\n<h1 style=\"text-align: left;\"><span style=\"color: #0067fb;\">Discover Max Global Defense  <\/span><\/h1>\n<p>In Softeng we have designed a modern, intelligent and proactive SOC service, which combines Microsoft technology along with advanced security solutions themselves, to obtain and maximize a global defense against cyber threats. <a href=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/eventos\/demo-de-soc-moderno-obten-y-maximiza-una-defensa-global-ante-las-ciberamenazas\/\"><strong>Discover in this DEMO<\/strong><\/a> the potential of<span class=\"TextRun SCXW96680474 BCX8\" lang=\"ES-ES\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW96680474 BCX8\"> <\/span><span class=\"NormalTextRun SCXW96680474 BCX8\">our next-generation SOC<\/span><\/span> to anticipate, react and respond to any cyber threat.<\/p>\n<p><a href=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/eventos\/demo-de-soc-moderno-obten-y-maximiza-una-defensa-global-ante-las-ciberamenazas\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5308\" src=\"\/wp-content\/uploads\/2023\/12\/Evento-bajo-demanda-Softeg-SOC-moderno-1-1024x282-2.png\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" alt=\"Softeg On-Demand Event - Modern SOC 1\" width=\"799\" height=\"221\"><\/a>[\/vc_wp_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;]Cybersecurity has become a critical issue for businesses around the world, and having a Security Operations Center (SOC) service is essential to protect all vulnerable attack surfaces. However, traditional SOCs are no longer able to cover with agility, speed and effectiveness the sophistication of today&#8217;s cyber-attacks and their constant evolution, from ransomware attacks to [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2554,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[78,79],"tags":[],"categoria_posts":[],"class_list":["post-37308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What requirements do you need to obtain a modern SOC?<\/title>\n<meta name=\"description\" content=\"Cybersecurity is a priority, and the most effective defense is to have a SOC. Find out what it is and what are the requirements to have one.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What requirements do you need to obtain a modern SOC?\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is a priority, and the most effective defense is to have a SOC. Find out what it is and what are the requirements to have one.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"Softeng\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-24T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-13T16:08:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/wp-content\/uploads\/2023\/05\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1229\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Daniel Navarro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/\"},\"author\":{\"name\":\"Daniel Navarro\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/person\\\/ed4f333f0a809c0610c9f7d9f224ff09\"},\"headline\":\"What requirements do you need to obtain a modern, intelligent and proactive SOC?\",\"datePublished\":\"2023-05-24T22:00:00+00:00\",\"dateModified\":\"2025-01-13T16:08:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/\"},\"wordCount\":788,\"publisher\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png\",\"articleSection\":[\"CYBERSECURITY\",\"SECURITY\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/\",\"name\":\"What requirements do you need to obtain a modern SOC?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png\",\"datePublished\":\"2023-05-24T22:00:00+00:00\",\"dateModified\":\"2025-01-13T16:08:44+00:00\",\"description\":\"Cybersecurity is a priority, and the most effective defense is to have a SOC. Find out what it is and what are the requirements to have one.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png\",\"width\":1500,\"height\":1229,\"caption\":\"SOC tradicional vs SOC moderno\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/blog\\\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What requirements do you need to obtain a modern, intelligent and proactive SOC?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\",\"name\":\"Softeng\",\"description\":\"Softeng | Maximize the cloud. Securely.\",\"publisher\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#organization\",\"name\":\"Softeng\",\"url\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logotipo-para-SEOYoast.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logotipo-para-SEOYoast.png\",\"width\":696,\"height\":696,\"caption\":\"Softeng\"},\"image\":{\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/softeng\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@SoftengSL\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\\\/en\\\/#\\\/schema\\\/person\\\/ed4f333f0a809c0610c9f7d9f224ff09\",\"name\":\"Daniel Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g\",\"caption\":\"Daniel Navarro\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What requirements do you need to obtain a modern SOC?","description":"Cybersecurity is a priority, and the most effective defense is to have a SOC. Find out what it is and what are the requirements to have one.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What requirements do you need to obtain a modern SOC?","og_description":"Cybersecurity is a priority, and the most effective defense is to have a SOC. Find out what it is and what are the requirements to have one.","og_url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/","og_site_name":"Softeng","article_published_time":"2023-05-24T22:00:00+00:00","article_modified_time":"2025-01-13T16:08:44+00:00","og_image":[{"width":1500,"height":1229,"url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/wp-content\/uploads\/2023\/05\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png","type":"image\/png"}],"author":"Daniel Navarro","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daniel Navarro","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/#article","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/"},"author":{"name":"Daniel Navarro","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09"},"headline":"What requirements do you need to obtain a modern, intelligent and proactive SOC?","datePublished":"2023-05-24T22:00:00+00:00","dateModified":"2025-01-13T16:08:44+00:00","mainEntityOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/"},"wordCount":788,"publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2023\/05\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png","articleSection":["CYBERSECURITY","SECURITY"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/","name":"What requirements do you need to obtain a modern SOC?","isPartOf":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/#primaryimage"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2023\/05\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png","datePublished":"2023-05-24T22:00:00+00:00","dateModified":"2025-01-13T16:08:44+00:00","description":"Cybersecurity is a priority, and the most effective defense is to have a SOC. Find out what it is and what are the requirements to have one.","breadcrumb":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/#primaryimage","url":"\/wp-content\/uploads\/2023\/05\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png","contentUrl":"\/wp-content\/uploads\/2023\/05\/Que-requisitos-necesitas-para-conseguir-un-SOC-moderno-inteligente-y-proactivo-Blog.png","width":1500,"height":1229,"caption":"SOC tradicional vs SOC moderno"},{"@type":"BreadcrumbList","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/blog\/what-requirements-do-you-need-to-obtain-a-modern-intelligent-and-proactive-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/"},{"@type":"ListItem","position":2,"name":"What requirements do you need to obtain a modern, intelligent and proactive SOC?"}]},{"@type":"WebSite","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#website","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","name":"Softeng","description":"Softeng | Maximize the cloud. Securely.","publisher":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#organization","name":"Softeng","url":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","contentUrl":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","width":696,"height":696,"caption":"Softeng"},"image":{"@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/softeng\/","https:\/\/www.youtube.com\/@SoftengSL"]},{"@type":"Person","@id":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/#\/schema\/person\/ed4f333f0a809c0610c9f7d9f224ff09","name":"Daniel Navarro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e85306c4726a5092f25aa17409ba329012330214ef80d60e6e3c7431747af1b1?s=96&d=mm&r=g","caption":"Daniel Navarro"}}]}},"_links":{"self":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/37308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/comments?post=37308"}],"version-history":[{"count":2,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/37308\/revisions"}],"predecessor-version":[{"id":37310,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/posts\/37308\/revisions\/37310"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/media\/2554"}],"wp:attachment":[{"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/media?parent=37308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categories?post=37308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/tags?post=37308"},{"taxonomy":"categoria_posts","embeddable":true,"href":"https:\/\/softengweb-90d2a82e0e-cxfthwd4h9efe5c6.z02.azurefd.net\/en\/wp-json\/wp\/v2\/categoria_posts?post=37308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}