SOC as a Service
Packages
We have tailored our subscription packages in four tiers to accommodate varying cyber risk levels posed to your organization, budgets and business requirements to ensure maximum cyber resiliency.
24 x 7 cyber guardian services, active cyber threat monitoring and full-access to customized use case and much more are included in Premium. Get started today.
Lite
BRONZE
Suitable for organizations that need to monitor the Internet Perimeter. Ideal for SMEs that need to outsource security monitoring services.
- NG-SIEM, UEBA and Open XDR
- Cyber Threat Intelligence
- Machine Learning Threat Detection
- Managed Detection and Response (MDR)
- Up to 50 Log Sources
- On-Premises Log Sources
- Cloud IaaS Log Sources
- Office 365 Monitoring
- 3 Months (Hot Storage)
- 6 Months (Warm Storage)
- 12 Months (Cold Storage) ***
- 1000 Events per Second **
- Access to CSOC Dashboards (Read-Only)
-
Monthly Report
Quarterly Report - Leverage In-House Library of Threat Detection Use Cases
- MITRE ATT&CK Coverage
- Threat Hunting
- Call Center Support
- Digital Forensics and Incident Response (Add-On)
Baseline
SILVER
Suitable for organizations that need to monitor internet perimeter and critical systems. Ideal for SMEs that need to outsource security monitoring services.
- NG-SIEM, UEBA and Open XDR
- Cyber Threat Intelligence
- Machine Learning Threat Detection
- Managed Detection and Response (MDR)
- 50-100 Log Sources *
- On-Premises Log Sources
- Cloud IaaS Log Sources
- Office 365 Monitoring
- 3 Months (Hot Storage)
- 6 Months (Warm Storage)
- 12 Months (Cold Storage) ***
- 2000 Events per Second **
- Access to CSOC Dashboards (Read-Only)
-
Monthly Report
Quarterly Report - Leverage In-House Library of Threat Detection Use Cases
- MITRE ATT&CK Coverage
- Threat Hunting
- Call Center Support
- Digital Forensics and Incident Response (Add-On)
- Managed Vulnerability Assessment (Add-On)
- Managed Perimeter Penetration Testing (Add-On)
- Managed Web Application Scanning (Add-On)
Advanced
GOLD
Best Value
Ideal for organizations that need to monitor the IT systems. Ideal for large organizations that need to outsource security monitoring services that involves an internal team.
- NG-SIEM, UEBA and Open XDR
- Cyber Threat Intelligence
- Machine Learning Threat Detection
- Managed Detection and Response (MDR)
- 100-200 Log Sources *
- On-Premises Log Sources
- Cloud IaaS Log Sources
- Office 365 Monitoring
- 3 Months (Hot Storage)
- 6 Months (Warm Storage)
- 12 Months (Cold Storage) ***
- 3000 Events per Second **
- Access to CSOC Dashboards (Read-Only)
-
Weekly Report
Monthly Report
Quarterly Report - Leverage In-House Library of Threat Detection Use Cases
- MITRE ATT&CK Coverage
- Threat Hunting
- Call Center Support
- Digital Forensics and Incident Response (Add-On)
- Managed SOAR (Add-On)
- Customized Use Cases Support
- Managed Vulnerability Assessment (Add-On)
- Managed Perimeter Penetration Testing (Add-On)
- Managed Web Application Scanning (Add-On)
- Attack Surface Management (Add-On)
- Managed OSINT and DARKINT (Add-On)
- Managed Security Awareness (Add-On)
- Managed Phishing (Add-On)
- Network Detection and Response – NDR (Add-On)
- Brand Monitoring (Add-On)
- Managed CASB (Add-On)
- Managed Compromise Assessment (Add-On)
Premium
PLATINUM
Ideal for organizations that need to monitor the internet perimeter. Ideal for large organizations that need to augment security monitoring services with their internal IT security and operations team.
- NG-SIEM, UEBA and Open XDR
- Cyber Threat Intelligence
- Machine Learning Threat Detection
- Managed Detection and Response (MDR)
- 200-300 Log Sources *
- On-Premises Log Sources
- Cloud IaaS Log Sources
- Office 365 Monitoring
- 3 Months (Hot Storage)
- 6 Months (Warm Storage)
- 12 Months (Cold Storage) ***
- 5000 Events per Second **
- Access to CSOC Dashboards (Read-Only)
-
Weekly Report
Monthly Report
Quarterly Report - Leverage In-House Library of Threat Detection Use Cases
- MITRE ATT&CK Coverage
- Threat Hunting
- Call Center Support
- Managed Digital Forensics and Incident Response
- Managed SOAR (Add-On)
- Customized Use Cases Support
- Managed Vulnerability Assessment (Add-On)
- Managed Perimeter Penetration Testing (Add-On)
- Managed Web Application Scanning (Add-On)
- Attack Surface Management (Add-On)
- Managed OSINT and DARKINT (Add-On)
- Managed Security Awareness (Add-On)
- Managed Phishing (Add-On)
- Network Detection and Response – NDR (Add-On)
- Brand Monitoring (Add-On)
- Managed CASB (Add-On)
- Managed Compromise Assessment (Add-On)
* Log sources can be added with a custom-tailored package
** Events per Second (EPS) can be added with a custom-tailored package
*** Log Retention longer than 12 months can be added with a custom-tailored package