As clients seek to improve operational performance in the area of threat detection and response, adopting an ad hoc method of operations will show its limitations. Security and risk management technical professionals can use this guide to learn how to build and operate a more formal security operations center.

Included in the full research are:

  • Overview
  • Problem Statement
  • The Gartner Approach
  • The Guidance Framework
  • Risks and Pitfalls
  • Gartner Recommended Reading