Although we assume our cybersecurity vendor is highly competent, secure, and effective, we should not forget those vendors also have vendors.
Checks for the credibility of a SOC vendor:
- They provide a customer portal using MFA and role-based access control for entry, showing various analyses and reports customized for different user types.
- They provide a 24/7, 365 service via multiple communication methods.
- Their services can be integrated into your business’ security incident response.
- Their own services are distributed from a minimum of two geographically distanced sites to ensure redundancy and quick disaster recovery.
- Their own staff is certified in the cybersecurity technologies they’re offering.
- If compliance requires, they can offer services from a specific location.