SOC
Our Security Operations Centre (SOC) service provides continuous monitoring, detection, and response to cyber threats. Utilising advanced technologies and expert analysts, we safeguard organisations' digital assets, mitigate risks, and ensure resilience against evolving cybersecurity challenges.
Features
- Continuous Monitoring
- Threat Detection
- Incident Response
- Forensic Analysis
- Security Intelligence
- Compliance Management
- Security Analytics
- Integration Capabilities
Benefits
- Improved Threat Detection
- Reduced Incident Response Time
- Enhanced Security Posture
- Compliance Readiness
- Cost Savings
- Scalability
- Expert Guidance
Pricing
£10,000 a unit a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 7 8 2 5 9 4 0 2 2 8 6 4 9
Contact
SECURE NEXUS LTD
Raymond Setchfield
Telephone: 07973573734
Email: rsetchfield@securenexus.co.uk
Planning
- Planning service
- Yes
- How the planning service works
-
In aiding buyers with implementing cloud hosting or software services within the context of a Security Operations Center (SOC), we employ a systematic approach aimed at ensuring seamless integration and effective cybersecurity management. Firstly, we conduct a comprehensive assessment of the buyer's current security infrastructure, regulatory requirements, and operational objectives. This initial analysis helps us understand their unique needs and challenges.
Following the assessment, we collaborate closely with the buyer to design a customised implementation plan tailored to their specific environment and goals. This plan encompasses selecting the appropriate cloud hosting or software services that align with their security requirements and compliance obligations. We provide guidance on best practices for configuring and deploying these services within a secure framework.
Furthermore, we assist in integrating these cloud services with the SOC's monitoring and incident response workflows, ensuring comprehensive coverage and visibility across the digital ecosystem. Throughout the planning process, we prioritise risk assessment and mitigation, identifying potential threats and vulnerabilities inherent to cloud environments. - Planning service works with specific services
- No
Training
- Training service provided
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
In facilitating the migration to the cloud or transitioning between cloud services within the framework of a Security Operations Center (SOC), we adopt a comprehensive and collaborative approach to ensure a smooth and secure transition.
Firstly, we conduct a thorough assessment of the buyer's current infrastructure, applications, and data, discerning their specific requirements and objectives. Leveraging this understanding, we collaboratively design a tailored migration or transition plan that aligns with their needs and security considerations.
Our team assists in selecting the most suitable cloud service provider(s) and deployment model(s), considering factors such as performance, scalability, security, and compliance. Throughout the process, we conduct thorough testing and validation to ensure compatibility, data integrity, and functionality.
We provide comprehensive training and support to facilitate user adoption and adaptation to the new cloud environment or services. This includes education on cloud security best practices, incident response procedures, and compliance requirements. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
-
In ensuring the quality assurance (QA) and performance testing within a Security Operations Center (SOC) context, we employ a meticulous and systematic approach to validate the effectiveness and reliability of our security measures and operations.
Our process begins with a comprehensive assessment of the buyer's SOC infrastructure, tools, and workflows to identify key areas for testing and improvement. Leveraging this understanding, we design and execute comprehensive test scenarios and strategies tailored to the buyer's environment.
These testing scenarios encompass a range of activities, including functional testing to validate the functionality of SOC tools and systems, integration testing to ensure interoperability and data flow between various security components, and performance testing to evaluate the responsiveness and scalability of SOC operations under different scenarios and workloads.
Throughout the QA and performance testing process, we leverage advanced tools and methodologies to collect and analyse data, identify any issues or gaps, and optimise SOC operations for maximum efficiency and effectiveness.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Certified security testers
- Yes
- Security testing certifications
- Other
- Other security testing certifications
-
- Certified Ethical Hacker v11
- CISSP
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
-
In supporting cloud hosting or software services within the context of a Security Operations Center (SOC), we offer comprehensive assistance to ensure robust security posture and effective threat management in cloud environments.
Our support begins with a thorough assessment of the buyer's cloud infrastructure, applications, and data, understanding their specific security requirements and objectives. Leveraging this insight, we collaborate closely with the buyer to design and implement tailored security measures that align with their needs and compliance obligations.
We assist in the selection and deployment of security tools and technologies optimized for cloud environments, ensuring seamless integration with existing SOC workflows and processes. This includes deploying cloud-native security solutions, configuring cloud access controls, and implementing encryption mechanisms to protect sensitive data.
Service scope
- Service constraints
- While our SOC service offers robust cybersecurity capabilities, buyers should be aware of potential constraints. These include the need for sufficient visibility into network traffic and security events for effective monitoring and detection. Additionally, integration with existing security infrastructure may require configuration adjustments and compatibility considerations. Buyers should also ensure adequate staffing and resources for 24/7 monitoring and response (unless managed and playbooks are in place). Finally, ongoing training and updates are essential to keep pace with evolving cyber threats and technology advancements.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response time to questions depends on Service Level Agreement (SLA) agreements and the ticket's priority. We prioritise swift responses based on the urgency and criticality defined in SLAs, ensuring timely resolution of inquiries. The specific SLA terms and ticket priorities guide our commitment to providing efficient and effective support to address questions promptly.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Support levels
- Our Support Level Agreements (SLAs) are designed to deliver timely and effective assistance. Users benefit from dedicated cloud engineers available to answer calls and address inquiries. Our SLA categorises issues into four priority levels, each with a corresponding response time commitment. Priority 1 (P1) urgent issues receive a rapid response within 30 minutes, ensuring critical problems are swiftly addressed. High-priority (P2) concerns are attended to within 2 hours, maintaining a prompt response for significant issues. Medium (P3) priority issues receive attention within 4 hours, and low-priority (P4) matters are addressed within 8 hours. These SLAs aim to provide a structured and responsive support framework, allowing users to receive assistance tailored to the urgency and criticality of their specific needs.
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Fortinet
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BRITISH ASSESSMENT BUREAU LTD
- ISO/IEC 27001 accreditation date
- 01/05/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Fortinet Certified Fundamentals in Cybersecurity
- Fortinet Certified Network Security Professional
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Tackling economic inequality within the secure nexus framework involves strategic procurement practices aimed at promoting fair wages, supporting local businesses, and fostering job opportunities for marginalised communities. By prioritising contracts with suppliers who demonstrate commitment to equitable employment practices and investing in initiatives that uplift disadvantaged groups, the secure nexus approach not only enhances economic stability but also cultivates a more inclusive and resilient society
Pricing
- Price
- £10,000 a unit a year
- Discount for educational organisations
- Yes