Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Security Infrastructure

EiQ Networks Launches Security Monitoring Service

Security information event management vendor EiQ Networks introduced a new remote management service today aimed at offering a helping hand to organizations looking to outsource security monitoring.

Security information event management vendor EiQ Networks introduced a new remote management service today aimed at offering a helping hand to organizations looking to outsource security monitoring.

With SOCVue, the company is making a play to appeal to businesses dealing with limited resources. SOCVue is a subscription service that provides EiQ SOC analysts to remotely manage an on-premise deployment of SecureVue, the company’s SIEM solution.

“The challenges faced by small to medium sized enterprises in hiring trained security professionals, and complexity of managing SIEM solutions coupled with the increasingly sophisticated threat landscape makes for ominous circumstances,” said Vijay Basani, president and CEO at EiQ Networks, in a statement. “Our goal with SOCVue is to deliver a simplified and cost effective offering for enterprises that are looking to overcome the security talent shortfall while closing the dangerous gap that can leave them vulnerable to cyber attacks.”

The service takes aim at the challenge of detecting and understanding security events. According to a recent Ponemon study, it takes an average of 80 days for an organization to identify a malicious breach and four months to resolve it.

To address this, the SOCVue offers 24×7 monitoring of a customer’s IT environment for suspicious activity, incident detection and notification by EiQ’s SOC team, as well as management and maintenance of the SecureVue application deployed on-premise. The analysts will also provide a regular review and advice on an organization’s security and compliance posture and on-demand investigative analysis. Customers can also receive compliance reports.

“Organizations are struggling to find qualified security professionals to monitor their environments for security and compliance issues, as well as finding the time and funding required for these types of resources within the organization,” said Larry Wilson, information security lead at University of Massachusetts, in a statement.  

Advertisement. Scroll to continue reading.
Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture


Identity and access governance vendor Saviynt has closed a $205 million financing round.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.


Security orchestration, automation and response (SOAR) provider Swimlane on Monday announced the launch of a security automation solution ecosystem for operational technology (OT) environments.

Identity & Access

The National Security Agency (NSA) has published a series of recommendations on how to properly configure IP Security (IPsec) Virtual Private Networks (VPNs).