Managed Security Operations Centre (SOC)
Our managed Security Operations Centre (SOC) service focuses on identifying what is important to monitor, how to investigate and respond to alerts, and knowing when to initiate a full incident response process. We have expertise of the full security operation lifecycle, including monitoring strategies, infrastructure and developing security monitoring playbooks.
Features
- Monitoring infrastructure logs/events e.g., firewalls, proxies, VPN, Windows AD, cloud
- UK based Security Operations Centre
- Customised solutions for OT and CNI environments
- Coverage options: Out of hours, office hours, extended hours, 24x7
- Regular feedback to improve your monitoring and response
- Monitor hybrid cloud operations and/or on-prem data centres
- Onsite or remote support staff augmentation - UK based
- Customised SLAs and tools e.g., ticketing
- Multi vendor support and ISP/cloud vendor support
- Threat hunting and data analysis
Benefits
- Assurance that your security monitoring needs are being delivered consistently
- Proactive monitoring and analysis that spots misuse and security threats
- Predictable cost model, to enable effective long-term planning
- Flexible/agile service to reflect changing business needs
- Services led by UKCSC Chartered, ACSC Security Architect, Head Consultant
- An ethos of staff and skills augmentation
- Assesses events from a prevention and control perspective
- Complete SIEM/SOC infrastructure available
- Designed to meet requirements of high threat environments
Pricing
£450 to £1,800 a unit a day
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 5 4 5 9 9 1 2 1 7 1 6 9 0
Contact
2T Security Ltd
Antony Badsey-Ellis
Telephone: 07711 037701
Email: tony.badsey-ellis@2t-security.com
Planning
- Planning service
- Yes
- How the planning service works
- We initially seek to understand how our clients want benefit from security monitoring, and use this to define a playbook of triage processes, and agree firmly what needs to be monitored based on business risk. Working with our consultants a work plan for the assessment to initially transfer security monitoring to our service and measure triage times and efficiency before agreeing on a final service level.
- Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
- Our services include training based on the deployed architecture and products, and how they apply to your organisation.
- Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
- We assess the security architecture requirements that enable you to define and migrate to hybrid cloud architecture. This includes the pertinent infrastructure that links traditional data centres with cloud hosting operations. In addition, we will consider the various types of remote users and sites that need to integrate with hybrid cloud. Essentially we will agree a security architecture and supporting migration strategy with you, including processes and tools to meet your hybrid cloud objectives.
- Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- No
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Security incident management
- Security audit services
Ongoing support
- Ongoing support service
- No
Service scope
- Service constraints
- To be fully effective, buyers must have an effective security architecture capable of mitigating common security threats. This architecture should include security monitoring software which can be made available to our team.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Subject to customer specific requirements and agreed SLA's
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Support levels
- This is a managed security operations service, and as we engage we will define a response level that meets the client needs. This can be tailored to requirements such as time of day, incident severity, systems impacted etc.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Blue Team Leader
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At 2T Security we are fully committed to continuously improving our environmental performance, examples of which include:
1. We assist the development of Science, Technology Engineering, and Maths (STEM) at a grassroots level and are proud to sponsor Harrington Sixth Form School who take part in the GreenPower racing series. This supports our wider sustainability aims to use renewable energy sources.
2. Where practical, travelling via the least impactful method for a given journey e.g., rail versus flying, public transport versus car.
3. Using ecologically friendly solutions to meet our business needs.
4. Managing waste generated from our business operations according to the principles of reduction, re-use, and recycling.
5. Purchasing office consumables that are from a sustainable source, reducing the reliance on single-use items, and by recycling all paper products, ink, or toner cartridges.
6. Becoming a net producer of sustainable energy, and supplement by only purchasing energy from “green” providers.
7. Leased or owned company cars must have zero emissions.
8. Working with suppliers who share our environmental aims.
9. Measuring and making public our energy consumption, generation, and environmental impact, reviewing results, and looking at how we can improve.
10. Complying, as a minimum, with all relevant environmental legislation as well as other environmental requirements.
11. We refine our Social Value Method Statement and associated Action Plan on a regular basis.Covid-19 recovery
2T Security has worked closely with Test & Trace (now UKHSA) programme over the last 3 years, and we continue to take Covid-19 very seriously. We remain committed to the wider Covid-19 recovery and some examples of this include:
1. SMEs were significantly impacted by Covid-19, and this is why we support local businesses and Small to Medium Enterprise (SMEs), where possible, preferring them to larger or global suppliers.
2. Align to the Prompt Payment Code, which ensures that SMEs are paid within 30 days of receipt of an invoice.
3. Taking an approach that doesn't view supply chain partners just as vendors but as collaborators working towards the successful end delivery to customers, behaving responsibly and delivering with mutual respect.
4. We refine our Social Value Method Statement and associated Action Plan on a regular basis.Tackling economic inequality
At 2T Security we are fully committed to tacking economic inequality, examples of which include:
1. Implementing strategies to benefit the lives and wellbeing of those affected by our activities within the localities and communities. We have demonstrated this by assisting the development of Science, Technology Engineering, and Maths (STEM) at a grass roots level. As such, we are proud to sponsor Harrington Sixth Form School who take part in the GreenPower racing series. GreenPower Education trust is a charity organisation seeking to kick start careers in engineering. This also supports our wider sustainability aims to use renewable energy sources.
2. We ensure we offer fair rates of pay, above the national average and minimum requirements.
3. Offering summer placements to university students, helping to inspire future generations.
4. Promote workforce diversity by targeting harder-to-reach and under-represented groups and communities.
5. Provide accessible, entry-level employment and training opportunities for local people and develop future talent.
6. Promote Fairness, Inclusion, and Respect (FIR) principles.
7. We refine our Social Value Method Statement and associated Action Plan on a regular basis.Equal opportunity
At 2T Security we are fully committed to continuously improving equal opportunities, examples of which include:
1. Providing opportunities for those disadvantaged, for example employing a Ukrainian refugee to assist us with our ISO27001 certification.
2. Deliver with transparency, supporting knowledge sharing, improving visibility and efficiency.
3. Value everyone’s voice, regardless of role or where they reside in the supply chain.
4. Respect and welcome diversity, relishing difference, ensuring everyone is treated equally, underpinned by our equal opportunities and diversity policy.
5. Collaborate with people who uphold the same social values, ethical business practices and environmental ambitions.
6. An active participant in the CyberFirst scheme since 2019, providing experience to summer students and year-in-industry students, and recruiting graduates to support their professional cyber security journey.
7. Proudly providing sponsorship of the CyberFirst Girls Competition 2024, supporting, and encouraging woman in Cyber careers.
8. Our resources have experience with job coaching in the community, helping those less fortunate get back into work, something we hope to continue to build on.
9. Providing training and qualification opportunities to our people, supporting future development and progression.
10. Working with charities and making charitable donations, for example our recent support of Osprey Leadership foundation, who work to inspire and enable young conservation leaders.
11. We refine our Social Value Method Statement and associated Action Plan on a regular basis.Wellbeing
At 2T Security we take health and wellbeing very seriously, examples of which include:
1. Taking an integrative approach that doesn't view supply chain partners just as vendors but as collaborators working towards the successful end delivery to customers, behaving responsibly and delivering with mutual respect.
2. Strive to be entrepreneurial in spirit and help new organisations, as well as our people, flourish.
3. We support a healthy work life balance, supporting our employees with families and their wellbeing, focusing on delivery outcomes above the hours spent at a desk.
4. Look to reduce ill health and improve wellbeing, underpinned by our health and wellbeing policy.
5. We refine our Social Value Method Statement and associated Action Plan on a regular basis.
Pricing
- Price
- £450 to £1,800 a unit a day
- Discount for educational organisations
- Yes