
SOC analysts are agnostic and trained on a variety of technologies and follow the highest standards to ensure a limited threat vector from insider threats and external attackers.
Security devices can also have their syslog and intrusion detection event logs forwarded for collection, which allows for additional monitoring capabilities.