{"id":1727,"date":"2009-10-16T00:00:00","date_gmt":"2009-10-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/10\/16\/microsofts-global-security-operations-center-gsoc-technology-solution\/"},"modified":"2021-12-30T11:39:53","modified_gmt":"2021-12-30T11:39:53","slug":"microsofts-global-security-operations-center-gsoc-technology-solution","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/10\/16\/microsofts-global-security-operations-center-gsoc-technology-solution\/","title":{"rendered":"Microsoft\u2019s Global Security Operations Center (GSOC) Technology Solution"},"content":{"rendered":"<p>Microsoft maintains three world-class, 24\/7 operations centers around the globe to monitor, communicate and coordinate responses for more than 700 Microsoft sites worldwide. The centers, located in the US, the UK and India, highly leverage \u201cout-of-the-box\u201d solutions such as Microsoft Office SharePoint Server, InfoPath, Communicator and Bing Maps. These work in conjunction with Microsoft Certified Partner solutions from Lenel, IDV Solutions and Twisted Pair Solutions, to reduce costs and improve operational effectiveness around the world. The GSOC technology solution set is currently available for global deployment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More information<br \/>\n\u2022Global Security White Paper<br \/>\n\u2022GSOC Datasheet<\/p>\n<p>Core technologies include<br \/>\n\u2022Office SharePoint Server<br \/>\n\u2022Office InfoPath<br \/>\n\u2022Office Communications Server<br \/>\n\u2022Office Groove<br \/>\nContact Us<br \/>\nEmail Us at: GSOCTours@microsoft.com<\/p>\n<p>Regional Contact Information:<\/p>\n<p>Americas<br \/>\nContact: Joe Fairchild<br \/>\nEmail: v-jofair@microsoft.com<br \/>\nPhone: +1 425-829-3126<\/p>\n<p>EMEA<br \/>\nContact: Geoff Paulsen<br \/>\nEmail: v-gepaul@microsoft.com<br \/>\nPhone: +44 7815 636582<\/p>\n<p>Asia<br \/>\nContact: Mohan Shanmugasundaram<br \/>\nEmail: v-moshan@microsoft.com<br \/>\nPhone: +65 68888749<\/p>\n<p>http:\/\/www.microsoft.com\/industry\/publicsector\/csa\/GlobalSecurityOperationsCenter.aspx<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-1727","post","type-post","status-publish","format-standard","hentry","category-secure"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1727"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1727\/revisions"}],"predecessor-version":[{"id":4214,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1727\/revisions\/4214"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}