There is something about the hum of the network at 8:30 in the morning and your third cup of coffee that is just right—it makes me think about how far we’ve come in cybersecurity. I cut my teeth as a network admin in ’93, mucking around in PSTN voice and data muxes — yeah, the old school analog ones. Fast forward to the present day and I am running PJ Networks, and helping organizations bulk up their defenses, and this one truth still hits home: your network operations center (NOC) and security operations center (SOC) can no longer operate in silos. They must communicate, share information, and act as one to meet modern threats head-on.
Here’s the thing. In 2003 when the Slammer worm struck, I was knee-deep in both network troubleshooting and cyber incident response. We spent hours tracking down packets, toggling multiplexers and blind to what the bad guys were pulling off on the other side of the network’s interface. The NOC considered the conversation around uptime and other SOC alerts and monitoring processes, and the SOC was ringing bells without enough contextual information from the NOC. That separation costs.
Here at PJ Networks, we’ve been leading the way in NOC-SOC integration for over five years—and it hasn’t just changed the game, it’s become the game. Most recently, we assisted three of the world’s largest banks modernize the zero-trust architecture by aggregating network monitoring with threat intel and compliance workflows. The result? More rapid threat detection, less false positives and a compliance posture that is as solid as can be.
The line between network trouble and security events is easily crossed. You ever see a DDoS that looks like packet loss? Don’t know maybe a host hitting the router causing jitter? If your NOC and SOC don’t have interconnected realtime data, you’re flying blind — or blaming the other team.
And I must tell you, constructing that integration is not a matter of slapping some dashboards side by side. It requires a change in culture — network engineers need some security chops, and analysts gotta understand networking at a fundamental level.
Here’s how we do it at PJ:
I just got back from DefCon and I’m stoked about the hardware hacking village for crazy tangential reasons that remind me of the overlap of physical and cyber in ways most teams are not prepared for. But at PJ Networks, our integrated NOC-SOC model helped stop a multi-stage attack for a retail client last quarter.
How? SOC alert was generated after much earlirer detection of anomalies in network flow data. Since the NOC (network operations center) had already flagged some isolated router spikes, the probes turned into the smoking gun that allowed the security team to connect the dots and find a compromised IoT device that was quietly scoping up internal subnets. Patching, along with network segmentation, brought it under control fast — no data leak, no downtime.
Once, because a zero-day exploit was discovered earlier, when our SOC noticed strange app behavior, but our NOC correlated those odd activities with suspicious VPN patterns coming from one user’s endpoint.
I’ll be the first to admit — early in my career I thought of security and network ops as different planets. Big mistake.
These are some nuggets from 30 years on the frontline:
Seriously. Anyway, I forget to run my password through xcrpt because most organizations are ludicrously complex in password requirements and yet don’t enable multi-factor authentication or cannot, or will not, invest the time into educating the user.
Here’s an analogy. Password policy without MFA is like having a car alarm and when you go to bed leaving your doors unlocked and the engine running. May give you a bit more peace of mind but…not such a great deterrent.
The answer, according to experts inside and outside Google, is integrated defenses — where hardware, software and people work together, seamlessly, to form an aggressive warning system against future intrusions. PJ Networks is along in that journey, and we’re excited to have others join us.
For CISOs and security architects, now here’s some food for thought:
Running a secure network in 2019 is like driving a manual-shift car, you’ve got to know when to change the gears, stay alert, and play for the hazards. Blind faith in autopilots will take you only so far.
I’m especially on fire because this meshed approach is optional no longer — it’s critical. With an expanding attack surface and increasingly sophisticated adversaries, PJ Networks’ integrated NOC-SOC enables a cybersecurity posture that’s proactive, reactive, and standby.
Hoping this post comes in useful for my fellow security pros who have to interpret the morass of modern cyber defense. And yea, sorry if this feels like a rambling rant on caffeine (see, coffee does have its uses!) but if you’ve spent damn near three decades in the batter’s box, you’ve got to tell people what just works.
Now, if you’ll pardon me, my coffee intake needs a refill. Have a few new firewall configs to tweak before the end of the day.
— Sanjay Seth, PJ Networks Pvt Ltd