Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity & Business Resilience

Adapting your security operations to the remote work environment

By Augusto Barros
remote workforce--how to prepare your security operations center
December 15, 2020

Security professionals never complain about boredom. Our lives are full of surprises caused by an ever-changing threat landscape and curveballs thrown by our business colleagues. Few, if any, of those surprises compare to the impact the COVID-19 pandemic has had on the technology environments we struggle to protect.

Visibility has become a particular weak point as workforces have adapted to a new virtual reality. To detect and respond to threats, we need visibility into the multiple environments and technology layers our organizations are using. Traditionally, security operations centers (SOC) used tools such as endpoint detection and response (EDR), network detection and response (NDR), and security information and event management (SIEM), a combination of technologies commonly referred to as the "SOC triad," to address this need. Due to the current climate, organizations have rushed processes to deploy technologies to enable remote work. As a result, many security teams found traditional tools are now blind to many new and emerging threats that have resulted from this scenario.

Organizations using NDR tools to monitor traffic between office workstations and the internet, for example, are still unable to monitor laptops connected to employees’ home networks. EDR tools can compensate by providing visibility into those managed devices. However, some organizations also enable access to corporate resources from personal devices, including mobile devices such as smartphones and tablets, which are unfriendly territory for tools requiring the deployment of agents.

Traditional SIEM tools have also suffered from these changes. The need to quickly adapt and scale to the new reality provided the perfect opportunity to accelerate the push to the cloud. Many organizations adopted new cloud services, from software as a service (SaaS) applications such as Office365 to infrastructure as a service (IaaS) and platform as a service (PaaS) resources. Many capabilities provided from a traditional data center, such as virtual private network (VPN) termination and web content filtering, are now being offered straight from the cloud. Collecting the logs from all the new solutions has proven to be the Achilles’ heel of the traditional on-premise SIEM. It is too much data, with many collection challenges, and requires new content to address a new group of threats.

Technology challenges are not the only issue caused by this sudden shift to remote work and cloud environments. Many organizations rely on service providers to support them in their threat detection and response efforts. Adoption of managed detection and response (MDR) services was on the rise before the pandemic hit, with many offerings based on EDR technology, which provides the required telemetry for detection, and the capabilities required for more active incident response. The organizations adopting this model considered the primary channel for security incidents in their environments to be endpoints, so relying on services based on endpoint technology made sense for them. With the sudden surge in adoption of SaaS and the use of personal devices, both customers and service providers are now struggling to adapt that service model to this new scenario. Even those using more traditional managed security services (MSS), based primarily on log-based solutions, are experiencing difficulties in integrating these services into their cloud environments. Many managed security service providers (MSSP) use traditional SIEM technology with capacity limitations to handle the high volume of data coming from cloud services. But this can be too expensive to be viable as a service.

Native Security as a Service (SaaS) solutions are being developed to handle the high volume and velocity of data flowing from the cloud environments. They include modern SIEM solutions, cloud focused tools such as cloud access security broker (CASB) and cloud security posture management (CSPM) and modern consolidated network and security services such as secure access service edge (SASE). They are enablers of modern security architecture approaches, such as Zero Trust models.

Native cloud SIEMs come with special-purpose threat detection content focused on the new threat vectors related to the cloud. The solutions are built on scalable architectures and are offered with license models not based on the volume of data ingested but other variables, such as number of users being monitored. Users can adopt additional policy enforcement practices by leveraging solutions such as CSPM and CASB. This can help organizations navigate complex configurations of security settings and services from public cloud providers. In addition, emerging SASE offerings can help transition controls such as secure web gateways to a cloud-based model, particularly helpful where users may be using personal devices and accessing corporate resources from anywhere in the world.

And what about those MSS and MDR providers? They are also evolving to adapt to a new reality. Many of those relying primarily on EDR are expanding their technology stack to cover the blind spots brought by the new technology use models. Some of these service providers are adding modern cloud SIEM solutions to their backends, where they can aggregate data from the existing EDR solution with data from other sources such as cloud service providers and SaaS applications. These SIEM platforms are also offering additional capabilities such as user and entity behavior analytics (UEBA) and advanced analytics, as well as tools to help streamline the triage of alerts and response to incidents, such as security orchestration, automation and response (SOAR).

Adapting to this "new normal" is not easy for any security operations team. But knowing there are solutions out there to support us in this effort is comforting. As unique as the cybersecurity challenges are, they fall into the same scenario as all the other changes we had to go through due to the COVID-19 pandemic. Trying to fit the old practices to the new reality is not only difficult but ineffective. This is the time to seize the moment and use it to deliver the security practices that will support your entire enterprise in this remote work, cloud-based era of digital business.

 

KEYWORDS: cyber security cybersecurity defense remote work remote workforce security operations Security Operations Center (SOC) SIEM

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Augusto Barros, Vice President of Solutions at Securonix.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Remote work costs companies between $5 and $10 million

    The cost of an unsecure remote environment to your organization? $5 to 10M

    See More
  • coronavirus

    Adapting online security to the ways we work, remotely and post-coronavirus

    See More
  • cyber laptop2

    3 Ways to Get Endpoint Security Back Under Control in the New Remote World of Work

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing