{"id":5844,"date":"2014-06-12T06:00:58","date_gmt":"2014-06-12T13:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5844"},"modified":"2014-06-11T13:14:05","modified_gmt":"2014-06-11T20:14:05","slug":"breakthrough-training-soc-professionals","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/breakthrough-training-soc-professionals\/","title":{"rendered":"A Breakthrough in Training SOC Professionals"},"content":{"rendered":"<p>I was honored to be a guest speaker at the dedication of Singapore\u2019s <a href=\"http:\/\/www.digisafe.com\/dcsc\/\" rel=\"nofollow,noopener\"  target=\"_blank\">ST Electronics DigiSAFE Cyber Security Centre<\/a> earlier this month. What a delight to experience the new Centre, which is dedicated to hands-on training for Singapore\u2019s Security Operations Center professionals and is the first of its kind in the region. <a href=\"https:\/\/www.ida.gov.sg\/About-Us\/Newsroom\/Speeches\/2014\/Opening-Address-by-Ms-Jacqueline-Poh-Managing-Director-Infocomm-Development-Authority-of-Singapore-at-the-Opening-of-the-DigiSAFE-Cyber-Security-Centre\" rel=\"nofollow,noopener\"  target=\"_blank\">Singapore IDA\u2019s Managing Director, Ms. Jacqueline Poh, gave the opening address and unveiled the new Centre<\/a>.<\/p>\n<p>Globally, we frequently lament the lack of solid security talent at a time when attacks seem omnipresent. In my opinion, our partnership with the Centre is a great opportunity to showcase how the platform approach we\u2019re taking at Palo Alto Networks can improve the experience of SOC operations.<\/p>\n<p>Rather than a conga line approach to security, with lots of different products in use, or a UTM with discrete security functions that never \u201ctalk\u201d to one another, our platform approach gives security practitioners:<!--more--><\/p>\n<ul>\n<li><strong>Visibility to all applications, content and users<\/strong>. You can then build security policies to provide application whitelisting according to employee, business unit, etc.<\/li>\n<li><strong>Closed loop communication and correlation<\/strong>. Once an unknown threat comes in, it\u2019s punted to the cloud sandbox where it\u2019s executed. The output from that analysis then enables onboard signature creation for future issues from that threat. You also have the benefit of what you\u2019re learning from the URL filtering in which you can compare threat data with known \u201cbad\u201d (attacker and C2) IP addresses.<\/li>\n<li><strong>Detection and prevention of advanced threats from data center to mobile device, and starting this fall the endpoint<\/strong>. Our platform natively shares information about known and unknown threats across each capability via our next-generation threat intelligence cloud, and enforces the unified security policy across network and endpoint.<\/li>\n<\/ul>\n<p>With these advantages, SOC analysts can lighten their workload, with fewer alerts and less manual correlation. Security operations management is happy, too: reduced resource loads mean fewer costs.<\/p>\n<p>My congratulations to ST Electronics and Singapore for a well-planned program! We look forward to the fruits of the partnership. See some photos from the event below:<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_5848\" aria-describedby=\"caption-attachment-5848\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:133.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-5848 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic.jpg\" alt=\"pic\" width=\"500\" height=\"667\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic.jpg 480w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-230x306.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-225x300.jpg 225w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-30x40.jpg 30w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><figcaption id=\"caption-attachment-5848\" class=\"wp-caption-text\">Palo Alto Networks platform in the Cyber Security Centre.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_5846\" aria-describedby=\"caption-attachment-5846\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-5846 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-2-500x280.jpg\" alt=\"pic 2\" width=\"500\" height=\"280\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-2-500x280.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-2-230x129.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-2-510x286.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-2-71x40.jpg 71w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-2.jpg 1130w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><figcaption id=\"caption-attachment-5846\" class=\"wp-caption-text\">Members of the Palo Alto Networks Singapore team, Mona Yam and Wing Kwong Wee at the Centre\u2019s opening.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_5847\" aria-describedby=\"caption-attachment-5847\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-5847 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-500x375.jpg\" alt=\"pic 3\" width=\"500\" height=\"375\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-500x375.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-230x172.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-400x300.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3-53x40.jpg 53w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/06\/pic-3.jpg 640w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><figcaption id=\"caption-attachment-5847\" class=\"wp-caption-text\">Presenting at the official opening of the Centre.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was honored to be a guest speaker at the dedication of Singapore\u2019s ST Electronics DigiSAFE Cyber Security Centre earlier this month. What a delight to experience the new Centre, which is &hellip;<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,484,410],"tags":[200,379,507],"coauthors":[],"class_list":["post-5844","post","type-post","status-publish","format-standard","hentry","category-events","category-government","category-vertical","tag-apac","tag-singapore","tag-st-electronics"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5844"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5844\/revisions"}],"predecessor-version":[{"id":5850,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5844\/revisions\/5850"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5844"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}