Entries by Gabby Nizri

Why Your SOC and NOC Should Run Together but Separately

The similarities between the role of the Network Operation Center (NOC) and Security Operation Center (SOC) often lead to the mistaken idea that one can easily handle the other’s duties. Furthermore, once a company’s security information and event management system is in place, it can seem pointless to spend money on a SOC. So why […]

Why You Should Also Automate Your NOC Incident Response

Recently, we shared some compelling reasons why incident management should be the next process you automate. Today, we’d like to take it a step further and offer some insight as to why NOC incident response is also a critical process that can benefit greatly from automation. These days, many larger organizations employ their own network […]

Why it’s So Important to Have an Incident Response Plan in Place

We recently touched on one of the latest big security breaches, which occurred when retail giant Target failed to properly handle an incoming cyber security threat. That one costly mistake cost millions of Target customers their privacy and brought global consumer trust to an all-time low. Now, another serious security breach has occurred, hitting 200 […]

Managed service provider (MSPs) and the IT process automation race – Your success depends on winning

Anyone who understands the role of a managed service provider (MSP) understands the importance of doing more with less. It’s really all about scale and common sense. The more efficient and effective your performance, the more success you’ll achieve. The problem is, achieving a high level of scalability isn’t always possible when budget is involved, […]

How to Monitor Log Files Using IT Process Automation

Log files contain important information about system and application health and problems that may occur. The information should be recorded in the log to be used as one of your tools to monitor and troubleshoot once there is a failure. IT process automation can help you monitor and plan response actions to alerts and failures that were generated […]