Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Security Operation Centers

Articles Tagged with ''Security Operation Centers''

airport-enews

How to Overcome Airport Identity Management Challenges

Kim Rahfaldt
May 8, 2018
No matter the size, airports are responsible for the security of all workers who are employed within their walls, on the tarmac, and grounds. The challenge is that 90 percent of those people don’t work for the airport. They work for the airlines, TSA or different vendors that reside as tenants within the airport.
Read More

McAfee Unveils New Global Security Operations Centers

March 28, 2018

McAfee unveiled two new state-of-the-art cyber and physical security operations centers (SOC), named the McAfee Security Fusion Centers, located in Plano, Texas and Cork, Ireland.


Read More
active-enews

3 Ways PSIM Can Help in Active Shooter Situations

Simon Morgan
November 28, 2017
No matter how many drills, practices and training exercises an enterprise runs through, nothing can truly prepare security staff for the chaos that results during a security incident such as an active shooter event, which, on average, can last for 12.5 minutes. Given this reality, it only makes sense for the security department to develop standard operating procedures (SOPs) for security staff and operators to follow in an active shooter or other crisis situation.
Read More
control-enews

How the Right PSIM Can Take Security Careers from the Basement to the Boardroom

Simon Morgan
October 17, 2017
Not too long ago, security operations centers (SOCs) and the enterprise security executives and the staff who ran them were relegated to airless basement offices with little security equipment that did no more than monitor video and manage guards.
Read More

Threat Hunters Infiltrate and Automate the Evolving SOC

Barbara G. Kay CISSP
September 7, 2017
You may be already planning your 2018 budget, and a new or expanded security operations center (SOC) could be high on the list. New data shows that almost one in three organizations have their sights on having a leading SOC within three years, up from one in seven today. How should you invest? How should you measure impact?
Read More
control

4 Best Practices for Deploying a PSIM Quickly and Efficiently

Simon Morgan
July 11, 2017
New PSIM solutions are changing perceptions in the professional security industry as they continue to prove how pragmatic and highly efficient they can be in improving the overall effectiveness and efficiency of security operations.
Read More
Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

The Global Security Operations Center is not new, but its value is becoming widely recognized as a necessity to support business goals and operations.
diane-2016-200.jpg
Diane Ritchey
March 1, 2017

GSOC, SOC, VSOC, JSOC, NOC, INSOC... The possibilities are endless when it comes to a center, building, or facility that mitigates and responds to enterprise security issues, either within the U.S. or on a global level.


Read More
leadership

Best Practices for Setting Up Your GSOC

Christopher Deringer
March 1, 2017

Whether you’re establishing your firm’s first Global Security Operations Center (GSOC), including a co-located Network Security Operations Center (NSOC) or refreshing your current GSOC’s and/or NSOC’s capabilities, here are my recommendations for success.


Read More
InterContinental Hotel, Hangzhou

Hangzhou Hotel Uses Advanced Mapping for Stronger Surveillance Coverage

March 1, 2017

At the InterContinental Hotel in Hangzhou, China, the accommodations are set to please even the highest standards.


Read More
command-enews

Staffing Your Security Operations Center to Run Like a Well-Oiled Machine

Kerry Matre
January 17, 2017
One of the major issues organizations face in building security operations centers (SOCs) is finding the qualified personnel needed to properly run the operation.
Read More
Previous 1 2 3 4 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing