{"id":18456,"date":"2024-07-24T13:16:03","date_gmt":"2024-07-24T13:16:03","guid":{"rendered":"https:\/\/acora.s.nomatter.dev\/?post_type=resources&#038;p=18456"},"modified":"2024-09-13T15:45:28","modified_gmt":"2024-09-13T15:45:28","slug":"managed-soc-an-expert-guide","status":"publish","type":"resources","link":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/","title":{"rendered":"Managed SOC: An Expert Guide"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"Managed_SOC_An_Expert_Guide\"><\/span><b>Managed SOC: An Expert Guide<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">70% of medium-sized businesses reported breaches or attempted cyber attacks within the last 12 months. In the UK, the total annual cost of cybercrimes for businesses is \u00a321 million. You can\u2019t hide from those numbers, so how can a best-of-breed Managed SOC play a part in reducing them?<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n\r\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\r\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#what-is-a-soc\">Read on to learn more<\/a><\/div>\r\n<\/div>\r\n\r\n<p><!-- \/wp:post-content --><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><!-- wp:buttons --><\/p>\r\n<div class=\"wp-block-buttons\"><!-- wp:button {\"width\":100} \/--><\/div>\r\n<p><!-- \/wp:buttons --><\/p>\r\n<p><!-- \/wp:buttons --><\/p>\r\n<p><!-- wp:heading {\"level\":3} --><\/p>\r\n<h3 id=\"h-index\" class=\"wp-block-heading\">Index<\/h3>\r\n<ol>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#what-is-a-soc\">What is a SOC?<\/a><\/strong><\/p>\r\n<\/li>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#what-is-a-managed-soc\">What is a Managed SOC?<\/a><\/strong><\/p>\r\n<\/li>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#why-you-need-a-managed-soc\">Why you need a Managed SOC?<\/a><\/strong><\/p>\r\n<\/li>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#benefits-of-a-managed-soc\">Benefits of a Managed SOC<\/a><\/strong><\/p>\r\n<\/li>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#capabilities-of-a-managed-soc\">Capabilities of a Managed SOC<\/a><\/strong><\/p>\r\n<\/li>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#implementing-a-managed-soc\">Implementing a Managed SOC<\/a><\/strong><\/p>\r\n<\/li>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#managed-soc-vs-mssp\">Managed SOC VS. MSSP<\/a><\/strong><\/p>\r\n<\/li>\r\n<li class=\"wp-block-group\">\r\n<p><strong><a href=\"#choosing-the-right-managed-soc-partner\">Choosing the right Managed SOC Partner<\/a><\/strong><\/p>\r\n<\/li>\r\n<\/ol>\r\n<p>&nbsp;<\/p>\r\n<p><!-- \/wp:list-item --><\/p>\r\n<p><!-- wp:list-item --><\/p>\r\n<p><!-- \/wp:list-item --><\/p>\r\n<p><!-- wp:list-item --><\/p>\r\n<p><!-- \/wp:list-item --><\/p>\r\n<p><!-- wp:list-item --><\/p>\r\n<p><!-- \/wp:list-item --><\/p>\r\n<p><!-- wp:list-item --><\/p>\r\n<p><!-- \/wp:list-item --><\/p>\r\n<p><!-- wp:list-item --><\/p>\r\n<p><!-- \/wp:list-item --><\/p>\r\n<p><!-- wp:list-item --><\/p>\r\n<p><!-- \/wp:list-item --><\/p>\r\n<p><!-- wp:list-item --><!-- \/wp:list-item --><\/p>\r\n<p><!-- \/wp:list --><\/p>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"what-is-a-soc\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"What_is_a_SOC\"><\/span><b>What is a SOC?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">A Security Operations Center (SOC) is a central unit that performs essential security functions that\u2019ll enhance a businesses overall state of readiness to respond to cyberattacks &#8211; it can either be outsourced (managed SOC), or in-house. In-house SOC is typically less cost-effective and more time consuming.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Whether it\u2019s an in-house SOC or managed, the team will include an SOC manager, security engineer, advanced security analyst, security investigator, and incident responder &#8211; all of whom will report to an organisation&#8217;s CISO.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">With the latest statistics stating there are now over 560,000 recorded attempted and successful cyber attacks, a team of security analysts and <a href=\"https:\/\/acora.s.nomatter.dev\/our-services\/managed-services\/rdr-cyber-security\/\">cyber security<\/a> managers is not a need; it&#8217;s a must.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Most companies will outsource to a SOC equipped with advanced threat intelligence tools to instantaneously reduce the threat and impact of cyber attacks. It\u2019s the best value for money for organisations without the resources or knowledge to manage it in-house. It\u2019s a 24\/7, fully comprehensive, centralised security operation that provides round the clock security support. <\/span>\u00a0<\/p>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"what-is-a-managed-soc\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"What_is_a_Managed_SOC\"><\/span><b>What is a Managed SOC?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/acora.com\/our-services\/managed-services\/cyber-security\/managed-soc\/\"><span style=\"font-weight: 400;\">Managed SOC<\/span><\/a><span style=\"font-weight: 400;\"> performs key security functions to enhance an organisation&#8217;s cyber security posture through detection, response and continuous functions. This is achieved through monitoring the security of an organisations supported environment for cyber threats, conducting triage, investigating and responding to security incidents and providing reports, utilising standard systems and processes.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">The continuous active search for cyber threats improves detection abilities, looking beyond the norms to reveal hidden threats &#8211; there\u2019s no waiting around for the threat to come to you.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">A security team will use different tools and procedures for identifying and responding to cyber threats. With continuous monitoring, preventing cyberattacks becomes almost seamless while incidents reduce in severity and companies keep compliance with regulations supported. And with real-time feedback, organisations can better understand their security posture and have actionable insights that enable the creation of effective cyber security defence mechanisms.\u00a0<\/span><\/p>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"why-you-need-a-managed-soc\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"Why_You_Need_a_Managed_SOC\"><\/span><b>Why You Need a Managed SOC<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Many organisations find it tricky to establish and maintain their internal SOCs due to costs or resource needs, as we&#8217;ve said already. A managed SOC removes the need to build and maintain SOC in-house resulting in reduced operational and infrastructure expenses.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">However, managed SOC services offer an alternative where external cyber security experts monitor your IT systems 24\/7 on behalf of a business. These are trained experts in cyber security and management and the end-to-end integration with the managed SOC service and the organisation&#8217;s existing IT functions creates a fully integrated service across the combined IT organisation.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Another statistic for you: the average cost per breach in the UK is <\/span><span style=\"font-weight: 400;\">\u00a33.4 million<\/span><span style=\"font-weight: 400;\">, with 50% of businesses experiencing a cyber attack in 2023. It\u2019s literally a 50\/50 chance of attack.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">And if one in two businesses in the UK will be a victim of a cyber attack, perhaps the question we should be asking is, why don&#8217;t you need managed SOC?<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"benefits-of-a-managed-soc\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"What_are_the_Benefits\"><\/span><b>What are the Benefits?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">We\u2019ve dotted in mentions of the benefits throughout this article, but here\u2019s a summary:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>24\/7 Monitoring:<\/b><span style=\"font-weight: 400;\"> Managed SOC services offer continuous network monitoring that means quick identification of suspicious activities and a generally healthy cyber security ecosystem.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cost-effective:<\/b><span style=\"font-weight: 400;\"> Establishing an internal SOC can be extremely costly. Managed SOC services are available for a fraction of the cost, allowing organisations to use professional security monitoring without incurring significant capital outlays. Yes, some are expensive, but even those are worth it. <\/span><b>Note: <\/b><span style=\"font-weight: 400;\">avoid using companies&#8217; open-source and cheaper implementation technologies. They&#8217;re not always secure.You should look for companies using enterprise-level tools.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Access to Expertise:<\/b><span style=\"font-weight: 400;\"> Managed SOC providers employ highly skilled security experts who keep updated about the newest threats and technologies.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Scalability:<\/b><span style=\"font-weight: 400;\"> With business growth comes changing security requirements. Consequently, managed SOCs have flexible and scalable security solutions capable of accommodating your growing business needs.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance Support:<\/b><span style=\"font-weight: 400;\"> Some industries have ultra-strict regulations on data protection. Managed SOC services will help you comply with legislation, mitigating legal penalties and damage to your reputation.<\/span><\/li>\r\n<\/ul>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"capabilities-of-a-managed-soc\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"What_are_the_Capabilities\"><\/span><b>What are the Capabilities?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">We&#8217;ve also discussed the capabilities of a Managed SOC Service, but let&#8217;s sum up the individual benefits:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Threat intelligence:<\/b><span style=\"font-weight: 400;\"> acquiring and analysing information about possible menaces to anticipate and minimise dangers.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Vulnerability Management:<\/b><span style=\"font-weight: 400;\"> Detecting and fixing security flaws in your systems.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Incident response:<\/b><span style=\"font-weight: 400;\"> rapid response to security breaches to reduce, if not eradicate, the harm caused and ensure a speedy recovery.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Security Information and Event Management: <\/b><span style=\"font-weight: 400;\">Managed SOCs monitor network traffic on all computers, servers, applications, services, etc, in real-time. Absolutely all systems in your ecosystem will be covered.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Security Analytics:<\/b><span style=\"font-weight: 400;\"> Advanced analytics spot trends and any irregularities that may be pointers to a security threat.<\/span><\/li>\r\n<\/ul>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"implementing-a-managed-soc\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"Implementing_a_Managed_SOC\"><\/span><b>Implementing a Managed SOC<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">First, the security experts we mentioned working within the Managed SOC centre assess your security systems to identify weaknesses and define your business scope to learn about the <\/span><span style=\"font-weight: 400;\">capabilities to provide monitoring, detection, triage, containment, and escalation<\/span><span style=\"font-weight: 400;\">.\u200b<\/span><span style=\"font-weight: 400;\"> They\u2019ll then perform a threat landscape review to learn about how your business manages threats and the general cyber threats you\u2019re likely to face, including a <\/span><span style=\"font-weight: 400;\">NIST controls coverage review to check current security controls. <\/span><span style=\"font-weight: 400;\">With that, they\u2019ll then focus on high-level enterprise threat modelling of major threats for enhanced mitigation.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Once end-to-end integration and complete understanding of your cyber security posture is complete, automated tools and human analysis will help continuously monitor your digital environment for possible threats and act where necessary. Once the threat is identified, the SOC team will investigate and respond with strategies to help mitigate any risks involved so that no actual damage occurs.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Most Managed SOC partners will send regular reports about your cyber health.<\/span><\/p>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"managed-soc-vs-mssp\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"Managed_SOC_vs_MSSP\"><\/span><b>Managed SOC vs. MSSP<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Although managed SOCs and managed security service providers (MSSPs) offer security services and benefits, there are some differences:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Service Scope:<\/b><span style=\"font-weight: 400;\"> Managed SOCs are umbrella services, including everything mentioned above. MSSPs only manage network activity, resources, and connections. They also generally only focus on security management rather than threat detection, resolution.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Experience Level:<\/b><span style=\"font-weight: 400;\"> Managed SOCs have highly skilled cybersecurity experts specialising in advanced threat detection and response. MSSPs might lack the same expertise and resources &#8211; and you don&#8217;t have the same SOC centre.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Customisation:<\/b><span style=\"font-weight: 400;\"> Managed SOCs give you personalised solutions for your business. MSSPs only offer standardised services that don&#8217;t fully address your unique security needs.<\/span><\/li>\r\n<\/ul>\r\n<p><!-- wp:image {\"id\":16622,\"width\":\"auto\",\"height\":\"70px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\"} --><\/p>\r\n<figure id=\"choosing-the-right-managed-soc-partner\" class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"94\" height=\"95\" class=\"wp-image-16622\" style=\"width: auto; height: 70px;\" src=\"https:\/\/acora-client-staging.b-cdn.net\/app\/uploads\/2024\/01\/acora-read-more.png\" alt=\"\" \/><\/figure>\r\n<h2><span class=\"ez-toc-section\" id=\"Choosing_the_Security_Partner\"><\/span><b>Choosing the Security Partner<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Considering all of the above when <a href=\"https:\/\/acora.s.nomatter.dev\/news\/announcements\/choosing-the-right-managed-it-and-cybersecurity-partner\/\">selecting a Managed Service Partner<\/a> for SOC, here are some tips for picking the best partner:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Gartner Backed:<\/b><span style=\"font-weight: 400;\"> Gartner backing will follow the <\/span><span style=\"font-weight: 400;\">Gartner SOC Model Guide<\/span><span style=\"font-weight: 400;\"> &#8211; <\/span><span style=\"font-weight: 400;\">the gold standard for managed SOC to ensure all roles are filled to meet the SOC\u2019s objective.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Service Level Agreements (SLAs): <\/b><span style=\"font-weight: 400;\">The managed SOC provider should have clearly defined SLAs outlining their response times and handle matters of concern.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Technology and Tools:<\/b><span style=\"font-weight: 400;\"> Do they use enterprise-level tools and technologies designed to secure your IT environment? As we said, some companies use open-source, low-tier technology that can be risky.<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Communication and Reporting:<\/b><span style=\"font-weight: 400;\"> Pick a managed SOC service that always sends you reports. A managed SOC should send regular reports and provide a dashboard for the customer\u2019s management highlighting the security posture, a list of incident threats, and essential actionable insights for continuous cyber security improvements.\u00a0<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Do you think you need a Managed SOC? If you look at the statistics we&#8217;ve given you throughout this article, we&#8217;d now say it&#8217;s essential for all brands with a growing online presence to invest in a Managed SOC service.<\/span><\/p>","protected":false},"author":45,"featured_media":18466,"template":"single-resources-video.blade.php","resources_categories":[308],"service-category":[],"service-type":[],"insight-format":[363],"class_list":["post-18456","resources","type-resources","status-publish","has-post-thumbnail","hentry","resources_categories-cyber-security","insight-format-pdf"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is a Managed SOC? | Acora\u2019s Expert Guide<\/title>\n<meta name=\"description\" content=\"In the UK, the total annual cost of cybercrimes for businesses is \u00a321 million. Our Managed SOC Guide explores a SOC&#039;s role in reducing that.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed SOC: An Expert Guide\" \/>\n<meta property=\"og:description\" content=\"In the UK, the total annual cost of cybercrimes for businesses is \u00a321 million. Our Managed SOC Guide explores a SOC&#039;s role in reducing that.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora NL Test\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T15:45:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/Managed-SOC-Guide-Acora.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/\",\"name\":\"What is a Managed SOC? | Acora\u2019s Expert Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/07\\\/Managed-SOC-Guide-Acora.jpg\",\"datePublished\":\"2024-07-24T13:16:03+00:00\",\"dateModified\":\"2024-09-13T15:45:28+00:00\",\"description\":\"In the UK, the total annual cost of cybercrimes for businesses is \u00a321 million. Our Managed SOC Guide explores a SOC's role in reducing that.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/07\\\/Managed-SOC-Guide-Acora.jpg\",\"contentUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/07\\\/Managed-SOC-Guide-Acora.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Managed SOC Guide Acora\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/insights\\\/managed-soc-an-expert-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managed SOC: An Expert Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\",\"name\":\"Acora NL Test\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is a Managed SOC? | Acora\u2019s Expert Guide","description":"In the UK, the total annual cost of cybercrimes for businesses is \u00a321 million. Our Managed SOC Guide explores a SOC's role in reducing that.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Managed SOC: An Expert Guide","og_description":"In the UK, the total annual cost of cybercrimes for businesses is \u00a321 million. Our Managed SOC Guide explores a SOC's role in reducing that.","og_url":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/","og_site_name":"Acora NL Test","article_modified_time":"2024-09-13T15:45:28+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/Managed-SOC-Guide-Acora.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/","url":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/","name":"What is a Managed SOC? | Acora\u2019s Expert Guide","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/#primaryimage"},"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/Managed-SOC-Guide-Acora.jpg","datePublished":"2024-07-24T13:16:03+00:00","dateModified":"2024-09-13T15:45:28+00:00","description":"In the UK, the total annual cost of cybercrimes for businesses is \u00a321 million. Our Managed SOC Guide explores a SOC's role in reducing that.","breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/#primaryimage","url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/Managed-SOC-Guide-Acora.jpg","contentUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/07\/Managed-SOC-Guide-Acora.jpg","width":1920,"height":1080,"caption":"Managed SOC Guide Acora"},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/insights\/managed-soc-an-expert-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nltest\/"},{"@type":"ListItem","position":2,"name":"Managed SOC: An Expert Guide"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website","url":"https:\/\/acora.s.nomatter.dev\/nltest\/","name":"Acora NL Test","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nltest\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/resources\/18456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/users\/45"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media\/18466"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media?parent=18456"}],"wp:term":[{"taxonomy":"resources_categories","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/resources_categories?post=18456"},{"taxonomy":"service-category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service-category?post=18456"},{"taxonomy":"service-type","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service-type?post=18456"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/insight-format?post=18456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}