Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE

Technical Brief - Best Practices in Empowering Your Security Analysts 

Technical Brief - Best Practices in Empowering Your Security Analysts 

The number of qualified cybersecurity analysts in security operations centers (SOC) for corporate environments is increasing. The available pool of analysts is rising with a stronger focus on the career path and the education available to information technology professionals. Even with the increase in qualified available analysts, bad actors and malicious entities are developing tools and methods to circumvent cybersecurity measures in place at companies. The lack of security personnel is a persistent challenge for CISOs and companies focused on global security. There are simply not enough analysts to perform the duties needed regularly to maintain a high level of security to protect global organizations. This includes monitoring known threats, detecting unknown bad actors, and reviewing logs, patterns, and behaviors to be aware of global activity across the network. Cybersecurity organizations and SOCs require intelligent security operations, tools, and processes to maintain and scale its security posture and global security for its employees, customers, and data. 

Security analysts require a combination of tools, processes, and training to identify threats and patterns of malicious behavior. As SOCs evolve the implementation of best practices to empower security personnel is essential to the growth and scale to combat threats to the enterprise. Micro Focus ArcSight has developed a core of best practices for security-centric enterprise organizations to provide their SOCs with guidance to empower security analysts regularly. In “Best Practices in Empowering Your Security Analysts” we provide insight from years of expert cybersecurity expertise from leading Micro Focus cybersecurity professionals allowing SOCs to streamline operational processes, reduce time to detection and response, and to ensure a high level of global security for companies. 

Please review our brief Best Practices in Empowering Your Security Analysts for more expert guidance and information about developing your SOC and adding intelligence and tools to your operations. 


Labels (2)


Some content on Community Tips & Information pages is not officially supported by Micro Focus. Please refer to our Terms of Use for more detail.
Top Contributors
Version history
Revision #:
2 of 2
Last update:
‎2018-06-15 15:27
Updated by:
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.