SOC provider glossary

Plain definitions for the terms buyers see when comparing SOC, MDR, MSSP, SIEM, XDR and response services.

Service models

Detection and response

SIEM Security Information and Event Management

SIEM is a security solution that aggregates and analyzes log data from across an organization's IT infrastructure...

SOAR Security Orchestration, Automation, and Response

SOAR refers to technologies that enable organizations to collect security threat data, automate responses to...

EDR Endpoint Detection and Response

Endpoint Detection and Response is a cybersecurity technology that continuously monitors end-user devices to...

NDR Network Detection and Response

Network Detection and Response is a security solution that monitors network traffic in real time, using behavioral...

IR Incident Response

Incident Response is the organized approach to addressing and managing the aftermath of a security breach or...

DFIR Digital Forensics and Incident Response

Digital Forensics and Incident Response combines the disciplines of investigating cyberattacks to determine what...

Threat Hunting

Threat hunting is the proactive practice of searching through networks and systems to detect and isolate advanced...

Detection Engineering

Detection engineering is the practice of designing, building, testing, and maintaining threat detection rules and...

False Positive

A false positive is a security alert that incorrectly indicates a threat or malicious activity when none actually...

MTTD Mean Time to Detect

Mean Time to Detect is a key SOC performance metric that measures the average time elapsed between the onset of a...

MTTR Mean Time to Respond

Mean Time to Respond is a key SOC performance metric that measures the average time from when a security threat is...

UEBA User and Entity Behavior Analytics

User and Entity Behavior Analytics uses machine learning and statistical analysis to establish baseline behavior...

Cloud, identity and data

Security program terms

Threat Intelligence

Threat intelligence is evidence-based knowledge about existing or emerging cyber threats, including context,...

ATT&CK MITRE ATT&CK

MITRE ATT&CK is a globally recognized knowledge base and framework of adversary tactics, techniques, and...

Vulnerability Management

Vulnerability management is the continuous process of identifying, evaluating, prioritizing, and remediating...

Penetration Testing

Penetration testing is an authorized simulated cyberattack performed against an organization's systems to evaluate...

Red Team

A red team is a group of security professionals who simulate real-world adversary tactics, techniques, and...

Blue Team

A blue team is the defensive security team responsible for maintaining an organization's security posture,...

Purple Team

A purple team is a collaborative security exercise or function where red team (offensive) and blue team...

Security Posture

Security posture refers to the overall strength and effectiveness of an organization's cybersecurity defenses,...

Compliance Framework

A compliance framework is a structured set of guidelines, standards, and best practices — such as SOC 2, HIPAA,...

Cyber Insurance

Cyber insurance is a specialized insurance product that helps organizations mitigate the financial impact of cyber...

Log Management

Log management is the practice of collecting, storing, normalizing, and analyzing log data generated by systems,...

Breach Warranty

A breach warranty is a financial guarantee offered by some MDR providers that pays out a specified amount...

Threat Landscape

The threat landscape is the full scope of current and emerging cyber threats facing an organization or industry,...