\u201cYou simply cannot do incident response and all the functions of a security operations center anymore without vendor operational support.\u201d That is a paraphrased version of what a colleague told me recently. At first, I raised my eyebrows; I\u2019m a huge believer in self-reliance. After more consideration, though, I saw more than a little truth in the statement.A typical modern SOC covers numerous functions, including incident response, intrusion detection system (IDS) monitoring, threat hunting and threat intelligence. And that\u2019s pretty much the bare minimum. Of course, in smaller environments, some of those functions may well be handled by the same person, but the functions nonetheless need to be there. This is 2016, after all.Almost all of the things found in a SOC \u2014 IDSs, security information and event management (SIEM), correlation and search tools, and a host of deeply technical tools such as disassemblers, decompilers, malware unpackers, etc. \u2014 require significant and fairly specialized tools. Clearly, you\u2019re going to have several vendors in that mix, though they may not be lending operational support.Some of the tools require specialized training as well. Becoming proficient at things such as IDS and malware analysis is not something you can do by reading a vendor\u2019s sales brochures. But again, tool training is a support element, albeit a vital one. What about operations?In the past 15 to 20 years, a cadre of security operations companies has appeared, companies that provide everything from staff augmentation during major incidents to deeply specialized services such as malware reverse engineering. Even threat intelligence companies have popped up. These companies provide expert support from their teams of engineers who specialize in threat monitoring and analysis. They can be highly effective at providing actionable technical information that can save a SOC staff a great deal of effort.So, yeah, I fully recognize there are companies out there that can offer enormously helpful services during times of crisis. But are they essential? Well, from firsthand observations of SOCs over the past five years, I can\u2019t think of a single one that doesn\u2019t have a dozen or so vendors on speed dial for operational support issues. Some of these aren\u2019t used often, but when they\u2019re needed, they\u2019re really needed.Put differently, you probably could build a top-notch SOC without operational support, but you\u2019d need expert-level-trained staff that span several highly technical functions, some of which you\u2019ll only have occasional use for, in all likelihood. Even if you can afford to train and drill staff to that level of proficiency, you\u2019re likely to have an unacceptable staff turnover rate if your tech A team is sitting around twiddling their thumbs much of the time.So my colleague\u2019s assertion seems pretty spot on. But it surely wasn\u2019t always the case that operational support in a SOC was as essential as it is today. That brings me to a bigger question. What has changed? Have the threats become so technically capable that they\u2019re beating us, or have our support vendors evolved their services to the point that we\u2019d be fools to not make use of them?We hear a lot about advanced persistent threats these days. Although I\u2019m not a fan of that term, it\u2019s doubtless that the attacks, techniques and tools used by our adversaries today have kept pretty close pace with Moore\u2019s Law. Compare the earliest rootkits we saw in the 1990s with today\u2019s malware, and it\u2019s clear that things have advanced in a huge way. For example, analyzing the attackers\u2019 tools requires a skill set that very few can muster.To try to meet that level of threat, innovative and enterprising vendors have built services that can be huge time-savers. These include appliances that largely automate much of the labor needed to reverse engineer all but the most stubborn of malware. This allows SOCs to answer some of the most pressing questions accurately and rapidly \u2014 questions such as whether a piece of malware is targeted at them or if it\u2019s just a general piece of malware. These are the things that can make a tremendous difference in deciding on the most appropriate course of action to take during a crisis.So, what has changed? I\u2019d say that, collectively, both the malware-writing and -analyzing communities have advanced in a seemingly never-ending arms race of sorts. I see those two as more or less in parallel with one another.And from those advances, a new generation of product and service vendors has been standing up to fill in voids and meet customer demands.Lastly, you have to credit some of these capabilities\u00a0to general advances in our computing and networking systems. A modern SIEM can consume and analyze oceans of data thanks to faster processing, cheap and fast storage, and so forth. The good guys and the bad guys alike benefit from that.If you run a SOC today, you\u2019d be well advised to seek an array of vendors that can help you when you need it most. Waiting until an emergency could well be too late to be helpful.With more than 20 years in the information security field,\u00a0Kenneth van Wyk\u00a0has worked at Carnegie Mellon University's CERT\/CC, the U.S. Deptartment of Defense, Para-Protect and others. He has published two books on information security and is working on a third. He is the president and principal consultant at KRvW Associates LLC in Alexandria, Va.