Skip to main content

Help us improve the Digital Marketplace - send your feedback

SECON CYBER SECURITY LTD

Managed Detection and Response (MDR) / SIEM and SOC as a Service

Secon's Managed Detection and Response service, offers real-time advance threat hunting, mitigation, and incident response to effectively and rapidly identify and respond to security threats and incidents. Designed to reduce risk, the service effectively combats cyber threats through a combination of state-of-the-art technology and genuine skilled human insight.

Features

  • Advanced 24x7x365 security operation centre.
  • Design, build, deploy and managed Azure Sentinel SIEM.
  • SIEM event monitoring, analysis, response and proactive Threat Hunting.
  • Supports secure log ingestion from on-premise, Cloud and Hybrid environments.
  • Collects logs from multiple sources including SYSLOG /CEF format.
  • Monthly service report reviews to support compliance.
  • Monthly service reviews to prioritise and focus on improvement areas.
  • Built-in Security Orchestration, Automation and Response (SOAR).
  • Incident mapping to tactics, techniques, procedures using MITRE ATT&CK framework.
  • Customised real-time security dashboard, workbooks, including drill down capabilities.

Benefits

  • Ability to deploy quickly.
  • Predictable and consumption based pricing.
  • Leverage and improve ROI from existing security investments.
  • Access to security expertise reducing need and cost of resourcing.
  • Agile and Adaptable service model to change with business needs.
  • Improved mean-time to detect and respond to threats and risks.
  • Demonstrate Cyber security best practice for regulatory authorities.
  • Utilise your existing Azure Sentinel SIEM tool.

Pricing

£975 to £1,200 a gigabyte a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hasit.purohit@seconcyber.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 5 2 2 5 4 2 3 1 1 3 8 6 4 3

Contact

SECON CYBER SECURITY LTD Hasit Purohit
Telephone: +447741 550 366
Email: hasit.purohit@seconcyber.com

Planning

Planning service
Yes
How the planning service works
Secon's planning service covers the onboarding of the Managed Detection and Response service, which involves the following stages:

1) Mobilise – Kick-off, planning and scheduling, set-up communication, clarify dependencies.

2) Deploy – Set-up secure tenant, access permissions, log collectors, rules, and dashboard.

3) Activate – Enable the service, set-up user access, provide knowledge transfer and documentation,

4) Operate – Handover to Secon's Security Operations service.
Planning service works with specific services
Yes
Hosting or software services the planning service works with
Managed Detection and Response

Training

Training service provided
Yes
How the training service works
Secon provides training on the use of the Managed Detection and Response platform and services, which includes: educating and up-skilling clients' resources and providing an expert escalation point for security concerns.
Training is tied to specific services
Yes
Services the training service works with
Managed Detection and Response

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
Secon assists with setting up and migrating the cloud service. This is achieved by discovering the current set up, designing the required solution and deploying the cloud service, including helping to enable the required features, functions and necessary configuration.
Setup or migration service is for specific cloud services
Yes
List of supported services
Managed Detection and Response

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
At Secon, we have a robust internal quality management process, where our solutions have undergone testing and validation before any deployment. We review each stage of the delivery process with all parties concerned. We additionally have an approver process, when progressing from one phase to the next, to ensure all issues are identified and resolved. We strive towards achieving a high quality standard by practicing a continuous improvement approach throughout the organisation.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
No

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
Secon provides support for the Managed Detection and Response service, via telephone and email on a 24*7*365 basis. This support covers the cloud service, log collectors, and user dashboards.

Service scope

Service constraints
Secon's Managed Detection and Response Service is provided remotely and is supported by our SOC 24*7*365.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Secon’s user support is covered 24*7*365 and response times are based on priority ranging from 30 minutes to 4 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Support levels
Secon provides three levels of support: Product Support, Product Maintenance, and Managed Services.

1) Product Support provides technical support for the customer’s security product or appliances such as Anti-virus software, email security, and firewall appliance.

2) Product Maintenance provides maintenance of the security products/appliances such as critical patch updates and minor upgrades released by the vendor.
3) Managed Services provides end-to-end ongoing maintenance and covers both Product Support as well as Product Maintainance.

Support is available 24*7*365 for Managed Detection and Response clients. Clients are assigned a Service Manager as a single point of contact.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
28/07/2023
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

  • Equal opportunity
  • Wellbeing

Equal opportunity

Secon Cyber recognises that it is essential to provide equal opportunities to all persons without discrimination. Secon Cyber has an equal opportunity policy that sets out the organisation's position on equal opportunity in all aspects of employment, including recruitment and promotion, giving guidance and encouragement to employees at all levels to act fairly and prevent discrimination on the grounds of sex, race, marital status, part-time and fixed term contract status, age, sexual orientation or religion.

Wellbeing

Secon Cyber provides private health insurance and practices a home working policy.
Secon Cyber strives to offer benefits that meet the diverse needs of all its employees, emphasising accessibility and support for everyone. Whether working from home, the office, or navigating health-related challenges, Secon Cyber is committed to creating an environment that upholds the wellbeing of all its employees.

Pricing

Price
£975 to £1,200 a gigabyte a month
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hasit.purohit@seconcyber.com. Tell them what format you need. It will help if you say what assistive technology you use.