:HomeWatch: Guard

Data and device protection plus security monitoring for your workforce – wherever they are, 24x7


Managed Security Services

Your Virtual team

Security Engineer

Security Analyst

Service Delivery Manager

Service Assurance Consultant

Threat Intelligence Specialist

With the advent of the Coronavirus, we are all having to adapt quickly to living and working in new ways, with the majority of employees, 3rd parties and contractors switching from the office to working remotely from home.

Consequently, employees may no longer enjoy the protection of their well-guarded corporate networks across a small number of offices, instead simply put, there are now as many offices as there are employees.

This isolation therefore introduces new and increased vulnerabilities to home workers and for firms at large.

These employees may now also have a direct connection to all common and popular cloud-based services without accessing the corporate security infrastructure therefore traditional monitoring systems may not detect data leakage, fraud or theft.

Victim Scenario

List of Services

Security Operation Center

  • Real-time incident management – collection, correlation, triage, investigation, remediation and reporting
  • Delivered by trained, accredited (ISO27001) and vetted staff
  • End to end platform and services management
  • Integrated workflow with your organisation
  • 12x5 and 24x7 vigilance

Global Threat Intelligence

  • Honeypots deployed across 5 continents
  • Malware analysis, quarantine and removal
  • Cyber threat research facility – high quality, relevant, reliable data
  • Constant visibility - protect against emerging cyber threats
  • Over 100,000 indicators of compromise

DLP - Data Loss Prevention 

  • Ensuring no data loss or leakage of sensitive corporate information that may be contained on local laptops
  • Visibility of end to end employee actions and behaviors – integrity of company security processes

Web Security Protection with CASB

  • Protects users from browsing malicious and unauthorised web sites
  • Controls how users can legitimately interact with the common cloud services


  • 100% managed SIEM Services
  • Dedicated log capture, threat analysis and incident response
  • Adapts to your IT environment – custom integrations included
  • Scales to 10,000 EPS

Security Engineer

End to end responsibility for your architecture and platform roll-out, health and management to ensure maximum availability

Threat Intelligence Specialist

Using our Cyber threat reseach facility and accessing over 100,000 indicators of compromise containing high quality, relevant and reliable data, the TIS is externally focused  focused on inbound malware analysis, quarantine and removal

The largest virtual team comprised of:

Virtual Team

Threat Hunter

Using the latest EDR and MDR technology integrated into i3  our Threat Hunters proactively hunt down and contain internal lateral movement of active and emerging threats

Security Architect

Highly-skilled with experience gained from working with major SIEM vendors. Responsibility lies with delivering integrated service components for maximum speed to resolution ”find to fix”

Possesses a macro and micro mindset when utilising Threat Intelligence awareness of what can impact customers

Security Assurance Consultant

Provides the best practice security guidance for IT projects as a part of your evolutionary journey  right advice at the right time that incorporates quarterly cyber-security briefings and maturity reviews.

Hold overall responsibility for security policy and process creation and maintenance

Security Delivery Manager

Leads both technical and operational co-ordination and launch of breach and crisis management resources collaboratively leading up-to 15+ client-side teams as a virtual resolver group

Security Analyst

Real-time incident management – collection, correlation, triage, investigation, remediation and reporting, delivered by our trained, accredited (ISO27001) and vetted (NPPV3 and SC cleared) staff

Our HomeWatch:Guard service, being cloud-based, will natively monitor the pathways and interactions with common cloud-based services employees need to perform their daily function.

The HomeWatch:Guard service reporting provides a monthly Productivity and Protection report detailing the types of activity against policy that you team members are performing across common cloud platforms, web services and social media.

This is allied to the protective shield we place around each end user’s laptop system and illustrates where we have prevented users from maliciously or accidentally attempting to leak company sensitive data.

The reports show where we have instigated web-based protection using URL filtering plus Cloud Access Security Broker (CASB) technologies.

Being powered and delivered by the SOC teams, mean we also evaluate and examine the current threat landscape to assess and advise what impacts this may have against the organisation such that we can take proactive defensive actions. 

KRI Reports

To receive your free example report complete your details today


The approach

Step #1:

Service implementation prep

Our tried and tested implementation methodology enables rapid deployment of our service whilst mitigating project risks.


Leverage our experience in delivering global security projects collaborating with multiple third parties.

Step #3:

Targeted alert use cases

By tailoring our extensive alert correlation rulesets, we reduce the noise from false positives and enhance detection rates of genuine cyber threats.


In addition, we deploy threat intelligence tripwires to detect external risks and threats to your organisation.

Step #5:

Costomised incident response plan

We tailor our mature incident detection and response processes to work effectively with your organisation and assigned third parties.


We support local and global security deployments engaged with numerous outsourced resolver teams.

Step #7:

Continued cyber due diligence

Achieving cyber due diligence doesn't stop once your SOC service is in operation. As best practice, we schedule regular reviews to ensure your service meets all existing and emerging security requirements as your business evolves.

Step #2:

Intergrate Log Feeds

We support log collection from on- premise network infrastructure, virtual infrastructure, security technologies and cloud systems.


We can also integrate with your custom applications by engaging our in-house development and integration team.

Step #4:

Security health check and threat reconnaissance

We perform a security health check and assist you in remediating existing security risks prior to going live.


  1. Detect existing risks and threats within your networks
  2. Perform passive reconnaissance of previously leaked data and cyber risk exposure analysis
  3. Present security posture report with actionable findings

Step #6:

SOC go live!

Your SOC service helps you achieve cyber due diligence through:


  1. Real-time threat monitoring, incident triage and
  2. 24x7x365 service delivered by UK cyber security
  3. Cyber intelligence monitoring and passive reconnaissance helps you to stay protected ahead of an
  4. Key Risk Indicator


Registered Office


2nd Floor

31 Chertsey Street




Security Operations Centre


11th Floor Centre City Tower

5-7 Hill Street


B5 4UA