Managed Security Services

SOC-in-a-Box

:Zone 1  |  Basic


Our entry-level technology-led SOC service focused on powerful end point protective systems, keeping you safe around the clock



Your Virtual team

Security Engineer


Security Analyst


Service Delivery Manager


Budgets are constantly being reviewed and IT teams are having to deal with a growing and advanced threat landscape


What is deemed relevant and proportionate differs for everyone – Zepko’s entry-level SOC-driven security technology services squeezes maximum value from your investment with the coupling of powerful yet affordable technology with the expertise of your own virtual security team – 24x7, so you can be assured that we’ve got this covered.


With in excess of 15 years of combined research and application into machine learning, automated cyber response, working with leading automated machine learning and behavioural profiling technologies, while running a Security Operations Centre  – we know what works in real terms and beyond the hype.

 

In simple terms, our SOC analysts are still our number one asset when it comes to effective incident qualification and response.

 

It is true that the machine is very powerful at discovering possible indicators of compromise, the “cyber needles in a haystack”. Afterall, we ingest into our monitoring service on average 80M log events per day from each of our clients. Without the machine it would be impossible for our analysts to identify security risks and threats from this much data.

 

But the human analyst is unmatched at understanding nuance and context behind security alerts. For example, were those suspicious logins due to a misspelled logon account, was the firewall change approved as part of your CAB process, did Jenny login to her Office 365 account from the Maldives to turn on her out-of-office reply as she is now on holiday and forgot to do it beforehand?

 

With the human touch, our expert team can quickly close out false positives through correlation with threat intelligence, understanding clearly the context of the log events, putting into focus how your network and business singularly operates, and even reaching out to users directly to confirm irregular behaviour patterns.

 

Naturally, we don’t stop at detection – fire alarms don’t put out fires , we have a suite of technologies that with analyst oversight, support automated defensive actions from network intrusion prevention to managed detection and response (MDR).


The 2019 Cyber Security Breach Survey says 63% of disruptive breaches were discovered by people not technology.

 

Victim Scenario

Data Loss Prevention

  • Real time detection and prevention of sensitive data leakage
  • Enforce encryption when moving or sending data

Intrusion Detection and Prevention

  • Real time detection and prevention of network intrusions and attacks
  • Identify and prevent lateral movement of compromises
  • Detect and block violations of acceptable use policies
  • Delivered remotely and powered by the SOC

Vulnerability Management

  • Internal and external (perimeter) scanning of your network assets
  • On-demand scanning for emerging threats and vulnerabilities
  • Compliance scanning to support regulatory regimes
  • Ensure your web applications meet OWASP best practice criteria
  • Track progress of hardening your systems and networks as your security posture improves
  • Delivered remotely and powered by the SOC

List of Services

We have researched and selected only the best technologies that live beyond the hype and truly deliver on the ground in real customer environments.


With remote install and operation there is minimal overhead on your team and should you wish to expand into a second, or third service – we have a simple upgrade path.

Victim 1.1
Victim 1.2

Security Engineer


End to end responsibility for your architecture and platform roll-out, health and management to ensure maximum availability

Threat Intelligence Specialist


Using our Cyber threat reseach facility and accessing over 100,000 indicators of compromise containing high quality, relevant and reliable data, the TIS is externally focused  focused on inbound malware analysis, quarantine and removal


Meet your virtual team comprising of:

Virtual Team

Threat Hunter


Using the latest EDR and MDR technology integrated into i3  our Threat Hunters proactively hunt down and contain internal lateral movement of active and emerging threats

Security Architect


Highly-skilled with experience gained from working with major SIEM vendors. Responsibility lies with delivering integrated service components for maximum speed to resolution ”find to fix”

Possesses a macro and micro mindset when utilising Threat Intelligence awareness of what can impact customers

Security Assurance Consultant


Provides the best practice security guidance for IT projects as a part of your evolutionary journey  right advice at the right time that incorporates quarterly cyber-security briefings and maturity reviews.

Hold overall responsibility for security policy and process creation and maintenance

Security Delivery Manager


Leads both technical and operational co-ordination and launch of breach and crisis management resources collaboratively leading up-to 15+ client-side teams as a virtual resolver group



Security Analyst


Real-time incident management – collection, correlation, triage, investigation, remediation and reporting, delivered by our trained, accredited (ISO27001) and vetted (NPPV3 and SC cleared) staff

KRI Reports

Simple SOC-driven protective technology reporting


On a monthly basis we deliver a data-driven and SOC-curated report of the vulnerabilities and risks across your estate.


These are presented in an easy-to-digest series of graphical summary dashboards together with simple, straightforward and actionable advice on remediation activities.


The technology-driven reports will also detail all investigated security risks within their specific cyber classifications. 

To receive your free example report complete your details today

 
 
 
 
 

Addresses:

Registered Office

Zepko

2nd Floor

31 Chertsey Street

Guildford

Surrey

GU1 4HD

Security Operations Centre

Zepko

11th Floor Centre City Tower

5-7 Hill Street

Birmingham

B5 4UA