According to the iSOC India Overview page, iSOC is "the leading provider of predictive security intelligence solutions for enterprises and government organizations." The company's domain was created in December, 2011. Apparently, iSOC being late to the security game prompted them to take shortcuts. Specifically, they plagiarized a majority of their web site content from other sources. All of their security offerings appear to be taken verbatim from a wide variety of other sources, including other security companies. Even their 'Overview' page is taken from another security company and fails to remove the company's name:
iSOC India:
iSOC is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help our customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than a years of applied expertise from CoreLabs, the company's innovative security research center. For more information, visit www.isocindia.com.
Core Security:
Core Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company's innovative security research center. For more information, visit www.coresecurity.com.
The iSOC "Contact Us" page lists their "Global Business Center" at 260 Madison Avenue, 8th Floor, New York, New York, 10016, which is a well-known virtual office used by many to present a vanity address in New York city.
The following table details a brief sampling of 10 web pages examined for plagiarism and copyright infringement. Both the iSOC page and original article are provided. As expected, their entire site is branded with their own copyright at the bottom of each page. This is willful infringement of copyright and inexcusable plagiarism.
SITE Article | Original Source |
Computer Hacking and Ethics | Computer Hacking and Ethics (Brian Harvey University of California, Berkeley) |
Penetration Testing (They even forgot to remove one instance of "The SecPoint Penetrator") | SecPoint (Penetration Testing compared to Vulnerability Scanning, The Penetration Test Process) |
Cloud Computing and Solutions (Left paper footnotes, and refer to it as 'paper') | enisa - Cloud Computing: Benefits, risks and recommendations for information security (Page 4) |
Sniffing, Security, Threats, Attacks | Young Engineerings Blog (and other sources) |
Forensic Investigation | SIFS India |
Security Operations Centre | Telstra SOC Page |
Architecture and Design Review Process | Microsoft: Architecture and Design Review for Security |
Cyber Security | Cyber Security Expert Blog |
Cryptography | An Overview of Cryptography |
Security Audit | Symantec: Conducting a Security Audit: An Introductory Overview |