{"id":38235,"date":"2020-11-17T17:00:30","date_gmt":"2020-11-17T17:00:30","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92195"},"modified":"2020-11-17T17:00:30","modified_gmt":"2020-11-17T17:00:30","slug":"key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/","title":{"rendered":"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/11\/SUR18_Holiday_Contextual_1674_RGB.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><em>This blog post is part of the Microsoft Intelligent Security Association (MISA) <\/em><a href=\"https:\/\/www.microsoft.com\/security\/blog\/microsoft-intelligent-security-association-misa\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>guest blog series<\/em><\/a><em>. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/intelligent-security-association\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about MISA here<\/a><\/em><em>.&nbsp;<\/em><em>&nbsp;<\/em><\/p>\n<p>Security teams are struggling to reduce the time to detect and respond to threats due to the complexity and volume of alerts being generated from multiple security technologies.<\/p>\n<p>With more workloads being migrated to the cloud, this brings an additional perimeter, which requires constant vigilance for early signs of a cyber-attack. New security challenges also emerge due to its elastic nature and the constant provisioning of new services.<\/p>\n<h2>How CyberProof is working with Microsoft to solve these challenges<\/h2>\n<p>CyberProof partnered with Microsoft to provide customers with cloud-scalable security monitoring, detection, and response services across the endpoint, network, identities, SaaS applications, and Azure cloud infrastructure.<\/p>\n<p>With the CyberProof Defense Center (CDC) service delivery platform pre-integrated with Microsoft\u2019s cloud-native SIEM, Azure Sentinel, CyberProof\u2019s built-in virtual analyst, SeeMo, automates up to 80 percent of tier one and two activities such as monitoring, enrichment, incident handling, and remediation. This frees up your team to focus on the most critical business issues.<\/p>\n<h2>Key Layers to Building a Smarter SOC<\/h2>\n<p>We recommend that security operations center teams implement the following three key layers of a Smarter Security Operations Center (SOC) architecture when looking to generate continuous value from your Azure security stack with managed security services.<\/p>\n<p>Each layer includes the integrations between Microsoft and CyberProof that help facilitate this architecture. For more information, <a href=\"https:\/\/go.cyberproof.com\/building-a-smarter-soc-in-the-new-normal\" target=\"_blank\" rel=\"noopener noreferrer\">check out our on-demand webinar<\/a>\u2014which we ran in collaboration with Microsoft\u2019s Chief Security Advisor EMEA, Cyril Voisin.<\/p>\n<h3>1. Data collection and integration layer\u2014enrichment of security data from multiple sources<\/h3>\n<p>This is particularly useful for enterprise-grade SOCs that collect and parse relevant data from multiple business units before going into a data lake. Organizing and classifying all of this data will save time and money when you start introducing integration and automation technologies, as the information will already be structured in an optimum way. Here\u2019s how log collection, normalization, and analysis work:<\/p>\n<ol>\n<li><strong>Integration<\/strong>: An organization identifies the assets, tools, technologies, and applications that need to be integrated.<\/li>\n<li><strong>Data normalization<\/strong>: Enterprise SOCs need to parse data before it enters the data lake\u2014to tag and filter it\u2014so the right information is being fed into the SOC in the most efficient way.<\/li>\n<li><strong>Data collection and<\/strong> <strong>analysis<\/strong>: Using a solution such as Microsoft\u2019s Azure Monitor Log Analytics and scalable storage such as Azure Data Lake, terabytes of data can be ingested in order to query and manage at scale. Machine learning can be used for the identification of anomalies and monitoring whether log sources are operating correctly, as well as to support threat hunting.<\/li>\n<\/ol>\n<p>At CyberProof, we leverage Azure Monitor Log Analytics and CyberProof Log Collection (CLC) SaaS technology to pull logs from all sources of data. These include a customer\u2019s existing Microsoft investments\u2014including on-premises, SaaS, and Azure assets\u2014and existing Microsoft security controls that generate alerts across identities, endpoints, data, and email, and cloud apps.<\/p>\n<h3>2. Security analytics layer\u2014generating contextual alerts and minimizing false positives<\/h3>\n<p>The traditional on-premises SIEM architecture has limited scalability\u2014such as, infrastructure costs are incurred up-front, based on peak requirements rather than on-demand provisioning that scales with current demand and growth over time. Also, effectively mapping logs from all ecosystems can be a time-consuming endeavor when having to correlate rules and create clear reporting.<\/p>\n<p>The world of security data collection has evolved. It is no longer a single query or rule that triggers the discovery of an incident. Typically, security monitoring identifies the proverbial \u201cneedle in the haystack\u201d\u2014and to do this type of threat detection requires broad visibility across the enterprise. This requires more processing power and data collection, in order to establish what the baseline really looks like. These are attributes are best accomplished by implementing security in the cloud.<\/p>\n<p>That\u2019s where Azure Sentinel comes in, supplying correlation and analytics rules and filtering massive volumes of events to obtain high-context alerts. Azure Sentinel uses machine learning to proactively find anomalies hidden within acceptable user behavior and generate alerts.<\/p>\n<p>Microsoft Azure Sentinel is fully integrated with CyberProof CDC platform, so customers can work from a single console to manage high-context alerts, carry out investigations, and handle incidents.<\/p>\n<h3>3. Orchestration, automation, and collaboration layer\u2014facilitating faster threat detection and response<\/h3>\n<p>Forrester\u2019s recent <a href=\"mailto:https:\/\/blog.cyberproof.com\/blog\/forresters-new-recommendations-for-choosing-mss\" target=\"_blank\" rel=\"noopener noreferrer\">assessment of midsized MSSPs<\/a> notes that orchestration and security automation plays a vital role for overburdened SOC staff.<\/p>\n<p>By automating tier one and two activities like monitoring, enrichment, investigation, and incident handling, our CDC platform takes much of the strain out of the process. Essentially, the CDC platform provides our IP as a service\u2014helping customers avoid the expenditure necessary to develop their own IP for a next-generation SOC.<\/p>\n<p>The CDC platform gives customers a \u201csingle pane of glass\u201d view from which to manage high context alerts, incidents, and report generation for stakeholders. It integrates the functionality of Azure Sentinel as well as other security investments.<\/p>\n<p>The CDC platform\u2019s benefits include:<\/p>\n<ul>\n<li><strong>Orchestration<\/strong>: Integrates external intelligence sources, enrichment sources, the IT service management system, and more into a single view.<\/li>\n<li><strong>Automation<\/strong>: Leverages CyberProof virtual analyst, SeeMo, who uses our Use Case Factory\u2014a catalog of attack uses cases consisting of prevention, detection rules, and response playbooks all aligned to the MITRE ATT&amp;CK framework\u2014to continuously update playbooks.<\/li>\n<li><strong>Collaboration<\/strong>: Facilitates real-time communication with our nation-state level analysts to help remediate incidents.<\/li>\n<li><strong>Hybrid engagement<\/strong>: Supports collaboration of CyberProof experts with the customer\u2019s team to remediate incidents and upskill the customer\u2019s team.<\/li>\n<\/ul>\n<h2>Customers can start benefiting now<\/h2>\n<p>CyberProof solution, used in tandem with Azure Sentinel provides 24\/7 security monitoring, which frees up SOC teams to focus on critical incidents.<\/p>\n<p>The platform\u2019s use of machine learning and behavioral analysis can reduce alert fatigue and false positives by up to 90 percent. It offers large-scale collection and correlation of data from the endpoint, cloud network, and users\u2014facilitating high-context alerts.<\/p>\n<p>These capabilities, as well as the platform\u2019s high-level collaboration abilities and up-to-date response playbooks, contribute to greater efficiency in threat detection and in responding to validated incidents.<\/p>\n<p>Yet, it doesn\u2019t take a lot of time to transition to CyberProof solution. CyberProof has a defined onboarding process that\u2019s based on each customer\u2019s requirements.<\/p>\n<p>As a managed service provider, we find that we can help customers get through the transition much more quickly than they would have on their own\u2014accelerating the process and shortening the time needed to start reaping the benefits of the solutions.<\/p>\n<p><em>Want more information? Check out our <\/em><a href=\"https:\/\/go.cyberproof.com\/managed-security-with-microsoft-azure\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Azure Security Services<\/em><\/a><em> page and the <\/em><a href=\"https:\/\/www.cyberproof.com\/how-it-works\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CDC platform from CyberProof<\/em><\/a><em>. Or contact us to learn more about how we can help you transition to a smarter SOC.<\/em><\/p>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA), visit the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/intelligent-security-association\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Intelligent Security Association website<\/a>&nbsp;where you can learn about the MISA program, product&nbsp;integrations, and find MISA members. Visit the&nbsp;<a href=\"https:\/\/www.youtube.com\/playlist?list=PLXPr7gfUMmKzygOBpqjb8iGavqDnopoXx\" target=\"_blank\" rel=\"noopener noreferrer\">video playlist<\/a>&nbsp;to learn about the strength of member&nbsp;integrations&nbsp;with Microsoft products.<\/p>\n<p>For more information about Microsoft Security Solutions, visit&nbsp;the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft&nbsp;Security&nbsp;website<\/a>. Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage of security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/msftsecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/11\/17\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post is part of the Microsoft Intelligent Security Association (MISA) guest blog series. Learn more about MISA here.\u00a0\u00a0 Security teams are struggling to reduce the time to detect and respond to threats due to the complexity and volume of alerts being generated from multiple security technologies. With more workloads being migrated to the&#8230;<br \/>\nThe post Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38236,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[5531,6426,347,7582,8630,654],"class_list":["post-38235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-information-protection","tag-azure-security","tag-cybersecurity","tag-microsoft-intelligent-security-association-misa","tag-misa","tag-security-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-17T17:00:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services\",\"datePublished\":\"2020-11-17T17:00:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\"},\"wordCount\":1232,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg\",\"keywords\":[\"Azure Information Protection\",\"Azure Security\",\"Cybersecurity\",\"Microsoft Intelligent Security Association (MISA)\",\"MISA\",\"Security Development\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\",\"name\":\"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg\",\"datePublished\":\"2020-11-17T17:00:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg\",\"width\":\"1080\",\"height\":\"720\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Information Protection\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/azure-information-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/","og_locale":"en_US","og_type":"article","og_title":"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-17T17:00:30+00:00","og_image":[{"width":1080,"height":720,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services","datePublished":"2020-11-17T17:00:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/"},"wordCount":1232,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg","keywords":["Azure Information Protection","Azure Security","Cybersecurity","Microsoft Intelligent Security Association (MISA)","MISA","Security Development"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/","url":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/","name":"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg","datePublished":"2020-11-17T17:00:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services.jpg","width":"1080","height":"720"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/key-layers-for-developing-a-smarter-soc-with-cyberproof-managed-microsoft-azure-security-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Information Protection","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-information-protection\/"},{"@type":"ListItem","position":3,"name":"Key layers for developing a Smarter SOC with CyberProof-managed Microsoft Azure security services"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38235"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38236"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}