Managed Security Services
The ultimate proactive IT protection
For end users who need a comprehensive service to proactively monitor, detect and defend live data breaches and indicators of compromise in real-time. Suitable for users who require assurance to meet audit standards and regulatory regimes.
Your virtual team
The only service to offer exclusive access to our proactive Threat Hunters, SOC-in-a-Box: Premium sees you’re backed by an exceptional virtual team of experts:
Discover more about the expert virtual team behind your Premium service here.
Security that seeks out the threats
SOC-in-a-Box: Premium goes beyond protective monitoring and incident management to proactively seek out, quarantine, and prevent cyber threats in real-time.
Protections that help remediate the impact to your business in the event of a breach are all well and good, but they still only ever respond after the fact.
While the threat may be neutralised, the damage is already done.
Reputation, revenue, and compliance may have all taken a hit, with your business now facing a long road to recovery.
But many modern exploits begin out of sight and take place far away from your IT infrastructure.
Domain and email impersonation can take place without any reliance on your own systems.
Tackling them requires a more proactive approach to protection and involves threat hunting beyond the boundaries of your business.
Prevent cyber threats before the fact
SOC-in-a-Box: Premium provides the ultimate in proactive IT protection.
By using intelligent tools and world-class know-how, we hunt, investigate, analyse, and remove potential threats in real-time.
Because we know no two security postures look the same, our SOC: Premium service is crafted around your business’ unique requirements.
Government department evidences high-degree of cyber due-dilligence
Your organisation was recently awarded a large government contract and has been targeted by attackers for your intellectual property and the client data you hold. Using leaked credentials obtained from a third party breach the attackers authenticate to a Citrix NetScaler service on your perimeter and pivot into your network.
Our Protective Monitoring and Incident Response detects anomalous activity and cyber threats in real-time. SLA based response times and field tested security runbooks enable our team to respond quickly and effectively contain cyber threats.
Our SOC team detects an anomalous logon to your network perimeter from an unexpected location. The team quickly actions their incident response runbook to have the AD account disabled to contain the threat.
We don't just stop there, our SOC team will ensure the incident is managed cradle to grave through its full life cycle. After containing, mitigating, eradicating and recovering from the incident, our team will perform a 5 Whys analysis to ensure the same threat or other related threats are prevented in the future.
2.3 Billion log events processed and correlated per month.
2.5K indicators of compromised investigated.
95% of alerts investigated and resolved directly by the SOC team.
List of Services
SOC-in-a-Box: Premium’s proactive protection includes:
Taking all the logs from your users’ laptops, our web security software, your virtual private network (VPN), and more, this data is correlated to help you better understand user behaviour as well as showing us any potential indicators of compromise.
Whether you need to call on our breach crisis team in an emergency, our expertise to help you implement new security policies, or our best practice guidance to ensure you’re meeting regulatory standards, we’re always here to keep your business safe.
Security Operation Center
Our SOC is where all the magic happens. Under the 24x7x365 vigilance of our specialist team, any incidents are tracked and remediated in real-time and users’ behaviour keenly monitored to ensure they’re adhering to acceptable use policies.
Global Threat Intelligence
Our deployed honeypots attract new cyber threats away from your users’ devices and allow us to observe, record, and understand how they work to reverse engineer defences against them.
Step #1: Service implementation prep
Our tried and tested implementation methodology enables rapid deployment of our service whilst mitigating project risks.
Leverage our experience in delivering global security projects collaborating with multiple third parties.
Step #3: Targeted alert use cases
By tailoring our extensive alert correlation rulesets, we reduce the noise from false positives and enhance detection rates of genuine cyber threats.
In addition, we deploy threat intelligence tripwires to detect external risks and threats to your organisation
Step #5: Customised incident response plan
We tailor our mature incident detection and response processes to work effectively with your organisation and assigned third parties.
We support local and global security deployments engaged with numerous outsourced resolver teams.
Step #7: Continued cyber due diligence
Achieving cyber due diligence doesn't stop once your SOC service is in operation. As best practice, we schedule regular reviews to ensure your service meets all existing and emerging security requirements as your business evolves.
Request a Premium Key Risk Indicator report
At every point of your SOC-in-a-Box: Premium service, we ensure you have visibility over our activity. By providing you with a regular Key Risk Indicator report, you’ll be presented with any threat intelligence advisories we’ve actioned, the security risks we’ve investigated, and the remedial solutions we recommend to continually enhance your defences.
Request a sample SOC-in-a-Box: Premium report today by sharing your details below.
Security Operations Centre
11th Floor, Centre City Tower
5-7 Hill Street
31 Chertsey Street