Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity & Business Resilience

Adapting your security operations to the remote work environment

By Augusto Barros
remote workforce--how to prepare your security operations center
December 15, 2020

Security professionals never complain about boredom. Our lives are full of surprises caused by an ever-changing threat landscape and curveballs thrown by our business colleagues. Few, if any, of those surprises compare to the impact the COVID-19 pandemic has had on the technology environments we struggle to protect.

Visibility has become a particular weak point as workforces have adapted to a new virtual reality. To detect and respond to threats, we need visibility into the multiple environments and technology layers our organizations are using. Traditionally, security operations centers (SOC) used tools such as endpoint detection and response (EDR), network detection and response (NDR), and security information and event management (SIEM), a combination of technologies commonly referred to as the "SOC triad," to address this need. Due to the current climate, organizations have rushed processes to deploy technologies to enable remote work. As a result, many security teams found traditional tools are now blind to many new and emerging threats that have resulted from this scenario.

Organizations using NDR tools to monitor traffic between office workstations and the internet, for example, are still unable to monitor laptops connected to employees’ home networks. EDR tools can compensate by providing visibility into those managed devices. However, some organizations also enable access to corporate resources from personal devices, including mobile devices such as smartphones and tablets, which are unfriendly territory for tools requiring the deployment of agents.

Traditional SIEM tools have also suffered from these changes. The need to quickly adapt and scale to the new reality provided the perfect opportunity to accelerate the push to the cloud. Many organizations adopted new cloud services, from software as a service (SaaS) applications such as Office365 to infrastructure as a service (IaaS) and platform as a service (PaaS) resources. Many capabilities provided from a traditional data center, such as virtual private network (VPN) termination and web content filtering, are now being offered straight from the cloud. Collecting the logs from all the new solutions has proven to be the Achilles’ heel of the traditional on-premise SIEM. It is too much data, with many collection challenges, and requires new content to address a new group of threats.

Technology challenges are not the only issue caused by this sudden shift to remote work and cloud environments. Many organizations rely on service providers to support them in their threat detection and response efforts. Adoption of managed detection and response (MDR) services was on the rise before the pandemic hit, with many offerings based on EDR technology, which provides the required telemetry for detection, and the capabilities required for more active incident response. The organizations adopting this model considered the primary channel for security incidents in their environments to be endpoints, so relying on services based on endpoint technology made sense for them. With the sudden surge in adoption of SaaS and the use of personal devices, both customers and service providers are now struggling to adapt that service model to this new scenario. Even those using more traditional managed security services (MSS), based primarily on log-based solutions, are experiencing difficulties in integrating these services into their cloud environments. Many managed security service providers (MSSP) use traditional SIEM technology with capacity limitations to handle the high volume of data coming from cloud services. But this can be too expensive to be viable as a service.

Native Security as a Service (SaaS) solutions are being developed to handle the high volume and velocity of data flowing from the cloud environments. They include modern SIEM solutions, cloud focused tools such as cloud access security broker (CASB) and cloud security posture management (CSPM) and modern consolidated network and security services such as secure access service edge (SASE). They are enablers of modern security architecture approaches, such as Zero Trust models.

Native cloud SIEMs come with special-purpose threat detection content focused on the new threat vectors related to the cloud. The solutions are built on scalable architectures and are offered with license models not based on the volume of data ingested but other variables, such as number of users being monitored. Users can adopt additional policy enforcement practices by leveraging solutions such as CSPM and CASB. This can help organizations navigate complex configurations of security settings and services from public cloud providers. In addition, emerging SASE offerings can help transition controls such as secure web gateways to a cloud-based model, particularly helpful where users may be using personal devices and accessing corporate resources from anywhere in the world.

And what about those MSS and MDR providers? They are also evolving to adapt to a new reality. Many of those relying primarily on EDR are expanding their technology stack to cover the blind spots brought by the new technology use models. Some of these service providers are adding modern cloud SIEM solutions to their backends, where they can aggregate data from the existing EDR solution with data from other sources such as cloud service providers and SaaS applications. These SIEM platforms are also offering additional capabilities such as user and entity behavior analytics (UEBA) and advanced analytics, as well as tools to help streamline the triage of alerts and response to incidents, such as security orchestration, automation and response (SOAR).

Adapting to this "new normal" is not easy for any security operations team. But knowing there are solutions out there to support us in this effort is comforting. As unique as the cybersecurity challenges are, they fall into the same scenario as all the other changes we had to go through due to the COVID-19 pandemic. Trying to fit the old practices to the new reality is not only difficult but ineffective. This is the time to seize the moment and use it to deliver the security practices that will support your entire enterprise in this remote work, cloud-based era of digital business.

 

KEYWORDS: cyber security cybersecurity defense remote work remote workforce security operations Security Operations Center (SOC) SIEM

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Augusto Barros, Vice President of Solutions at Securonix.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • coronavirus

    Adapting online security to the ways we work, remotely and post-coronavirus

    See More
  • cyber laptop2

    3 Ways to Get Endpoint Security Back Under Control in the New Remote World of Work

    See More
  • The Cyber 101 Discussion

    Navigating the Unknown: Lessons Learned in the Full-Scale Transition to Remote Work

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!