{"id":188,"date":"2024-04-18T13:51:51","date_gmt":"2024-04-18T13:51:51","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/resources\/?p=188"},"modified":"2026-05-12T13:49:33","modified_gmt":"2026-05-12T13:49:33","slug":"why-socs-fail","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/resources\/why-socs-fail\/","title":{"rendered":"Why SOCs Fail"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"188\" class=\"elementor elementor-188\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"aux-parallax-section elementor-element elementor-element-8621b35 e-flex e-con-boxed e-con e-parent\" data-id=\"8621b35\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,97C126.7,96.3,0.8,19.8,0,0v100l1000,0V1C1000,19.4,873.3,97.8,500,97z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf1d278 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"cf1d278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\">INFOGRAPHICS<\/h1><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Why SOCs Fail<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e1c1fb elementor-widget elementor-widget-aux_modern_button\" data-id=\"9e1c1fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-black aux-modern-button-md aux-modern-button-normal aux-modern-button-default aux-icon-left\" href=\"https:\/\/lmntrix.com\/resources\/\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                        <i aria-hidden=\"true\" class=\"auxicon2 auxicon2-arrow-chevron-fat-left\"><\/i>                    <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">Back to Resource center<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"aux-parallax-section elementor-element elementor-element-d23fb07 e-flex e-con-boxed e-con e-parent\" data-id=\"d23fb07\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-65e069a e-con-full e-flex e-con e-child\" data-id=\"65e069a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab6c555 elementor-widget elementor-widget-aux_image\" data-id=\"ab6c555\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"widget-container aux-widget-image aux-alignnone aux-parent-aub20296aa\">\n    <div class=\"aux-media-hint-frame \">\n        <div class=\"aux-media-image \" >\n        \n            \n\n            \n            <img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"482\" src=\"https:\/\/lmntrix.com\/resources\/wp-content\/uploads\/2024\/04\/why_socs_fail.webp\" class=\"aux-attachment aux-featured-image aux-attachment-id-189\" alt=\"why_socs_fail\" data-ratio=\"1.24\" data-original-w=\"600\" \/>            \n                <\/div>\n    <\/div>\n\n<\/section><!-- widget-container -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af6e450 elementor-widget elementor-widget-aux_modern_button\" data-id=\"af6e450\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-info aux-modern-button-md aux-modern-button-curve aux-modern-button-default aux-icon-\" href=\"https:\/\/lmntrix.com\/res\/Why-SOCs-Fail.pdf\" target=\"_blank\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                                            <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">Download Infographic<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f59c505 e-con-full e-flex e-con e-child\" data-id=\"f59c505\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be7d5cb elementor-widget elementor-widget-text-editor\" data-id=\"be7d5cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today\u2019s SOCs should have everything it needs to mount a competent defense of the ever-changing IT enterprise. Yet most SOCs continue to fall short in keeping the adversary\u2014even the unsophisticated one\u2014out of the enterprise.<\/p><p>The deck is clearly stacked against the defenders. While the adversary must discover only one way in, the defenders must defend all ways in, limit and assess the damage, and find and remove adversary points of presence in enterprise systems. And cybersecurity experts increasingly recognize that sophisticated adversaries can and will establish lasting footholds in enterprise systems. If this situation were not bad enough, more often than not, we are our own worst enemy. Many SOCs expend more energy battling politics and personnel issues than they do identifying and responding to cyber-attacks. All too often, SOCs are set up and operate with a focus on technology, without adequately addressing people and process issues. The main premise of this infographic is that a more balanced approach would be more effective.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"aux-parallax-section elementor-element elementor-element-d1f96b0 e-flex e-con-boxed e-con e-parent\" data-id=\"d1f96b0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"aux-scroll-anim elementor-element elementor-element-a10030c elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-move-in=\"rotateIn\" data-move-out=\"rotateIn\" data-axis-x=\"0\" data-axis-y=\"110\" data-rotate=\"55\" data-scale=\"1\" data-vp-top=\"0.5\" data-vp-bot=\"0.5\" data-el-top=\"0.2\" data-scroll-animation-off=\"1024\" data-id=\"a10030c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"auxicon auxicon-lists\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-566fef5 aux-appear-watch-animation aux-fade-in elementor-widget__width-auto elementor-widget elementor-widget-aux_modern_heading\" data-id=\"566fef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\"><\/h1><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Download <\/span><span class=\"aux-head-highlight\">Our Datasheet<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5866ded elementor-widget__width-auto elementor-widget elementor-widget-aux_modern_button\" data-id=\"5866ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-info aux-modern-button-md aux-modern-button-curve aux-modern-button-default aux-icon-\" href=\"https:\/\/lmntrix.com\/res\/LMNTRIX-XDR-DATASHEET.pdf\" target=\"_blank\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                                            <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">DOWNLOAD NOW<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>INFOGRAPHICS Why SOCs Fail Back to Resource center Download Infographic Today\u2019s SOCs should have everything it needs to mount a competent defense of the ever-changing IT enterprise. Yet most SOCs continue to fall short in keeping the adversary\u2014even the unsophisticated one\u2014out of the enterprise. The deck is clearly stacked against the defenders. While the adversary [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":189,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[28,27,26,25],"class_list":["post-188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infographics","tag-graphic","tag-info","tag-infographic","tag-infographics"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":46,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":3550,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/188\/revisions\/3550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/media\/189"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}