<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2659386&amp;fmt=gif">
Request a Demo
Cysiv Blog

KuppingerCole Recognizes Cysiv as an Innovator in Security Operations Center-as-a-Service

Back to Blog

As an innovator in the field of security operations center-as-a-service (SOCaaS), Cysiv is delighted to be recognized as a top provider by analyst firm, KuppingerCole. 

The KuppingerCole Market Compass covers the SOCaaS market that has emerged and continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either instead of or as a supplement to permanent on-premises SOCs. Cysiv earned top scores across seven of nine key attributes.

“We’ve always believed that a robust, cloud-native next-gen SIEM platform that is powered by data science, automation and a blend of threat detection techniques, and is operated 24/7 by a team of experts, would be a dramatic improvement over traditional SIEMs that are plagued by high costs, complexity and often aren’t monitored. This report reaffirms that belief.” - Partha Panda, Cysiv CEO 

The Executive View report provides a full overview of the challenges businesses face in the drive to digital transformation, highlighting the difficulty facing organizations when dealing with overwhelming numbers of security alerts. It identifies the emergence of SOCaaS as a way to efficiently, and cost effectively, manage cybersecurity risks, enabling a standardized threat detection and response capability. 

KUPPINGERCOLE EXECUTIVE GUIDE TO CYSIV SOCAAS

Overview of Cysiv’s SOC Services

The KuppingerCole report provides a full overview of Cysiv’s SOCaaS platform and services. It highlights that our service is designed to monitor on-prem, cloud, and hybrid IT environments, fully backed by service level agreements. Our blend of machine learning, behavior analytics, statistics and threat intelligence backed by expert teams of security engineers, analysts, threat researchers and data scientists supports our client’s professional teams. The report notes that the Cysiv platform is designed to deliver: 

  • Faster, higher fidelity threat detection.
  • Detect previously unknown threats.
  • Reduce false positives.
  • Eliminate alert fatigue.
  • Enable effective threat hunting and forensics.

The platform integrates fully with existing SIEMs and the analysis notes that Cysiv can complement or replace an existing SIEM to provide core functionality. We offer a consumption-based price model and the report details what this may look like for clients, also considering where we deploy security controls on their behalf. The report considers our offering best-suited to medium to large organizations with established security teams but it also notes the increased interest we have received from small businesses who want to manage their threat detection and response strategies. 

Identifying Our Strengths

The report highlights Cysiv’s cloud-native, highly- scalable security platform as one of our many key strengths. As organizations grow, our platform adapts to changing business needs, growing alongside. By offering multiple levels of service, organizations can choose the service level that is most appropriate to their needs. The report further highlights our ability to work in tandem with in-house security teams, offering full co-management capabilities. 

We scored particularly highly in terms of threat intelligence as a result of the large number of external threat intelligence sources used in our solution. The report also scores us strongly positive in terms of:

  • Security
  • Deployment
  • Interoperability
  • Usability
  • Incident Response

It identified that Security Orchestration, Automation and Response (SOAR) is a key area of focus for us, noting that this built-in platform functionality is a key strength, and one that we plan to expand to support further automation needs 

Download the full KuppingerCole Report today and discover what sets Cysiv SOCaaS apart from other offerings.

Leave a Comment