Sentinel Managed SOC Detection and Response
We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.
Features
- Microsoft Sentinel Detection and Response
- Managed Detection and Response (MDR)
- Extended Detection and Response (XDR)
- Endpoint Detection and Response (EDR)
- Automated Incident Response
- 24/7 Managed SOC
- Incident Handling, Investigation and Tuning
- Threat Hunting and Threat Intelligence
- Data Sources Onboarding Support
- Rule and Playbook Creation
Benefits
- Fully Managed 24/7 Cyber Defence
- Fixed Pricing with No Hidden Costs
- Unlimited Alerts and Response Actions
- 24/7/365 UK Based Operations and Monitoring
- Unlimited Threat Hunting
- Rapid Response and Threat Containment Included
- 24/7 Incident Helpline
- Scalable to Councils of Any Size
- Public Sector Expertise
- Dedicated SOC and Account Management Team
Pricing
£3.22 to £5.99 a device a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 0 8 8 1 1 9 0 6 6 3 8 1 0 3
Contact
COMMUNICATE TECHNOLOGY LIMITED
Jed Wrigley
Telephone: 08004048888
Email: jed.wrigley@communicate.technology
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Our Managed Detection and Response service for Microsoft Sentinel protects any IT environment, including cloud services (public, private, hybrid), data centres, on-premises systems, and multi-platform environments like Microsoft 365, Azure, AWS, Google Cloud, VMware, and more. It provides unified visibility and supports custom and legacy systems.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Pricing is based on a per-device/endpoint model. Clients must provide Communicate SOC access to all relevant solutions for monitoring, detection, and response. Share login details for monitoring solutions and notify of authorised users needing access to the Managed SOC ticketing system. Ensure client representation at implementation meetings. Approval is required for all playbook scenarios before active response actions are taken. Incident response outside retainer hours is subject to standard fees. PII and PCI data must be obfuscated before sending to the Managed SOC. For dedicated PCI services, contact your account manager for assistance.
- System requirements
-
- Provide necessary Microsoft licensing and tools to support Managed SOC.
- Assist with installation, setup, and configuration of vendor tools.
- Ensure systems meet Microsoft Sentinel’s minimum integration requirements.
- Open necessary firewall ports to support the Managed SOC service.
- Configure data sources for integration with monitoring solutions.
- Provide resources for integrating the Managed SOC service successfully.
- Ensure encryption is applied to all Managed SOC integrations.
- Offer remote access to Communicate for configuration and support.
- Provide browser access to the Managed SOC ticketing system.
- Maintain system functionality and ensure network capacity supports service.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Refer to SLAs within service definition document
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Refer to SLAs within service definition document.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a seamless onboarding experience, managed by our dedicated technical specialists and account management team. From initial planning through to full
deployment, configuration, and training, we ensure your Microsoft Sentinel environment
is set up to deliver maximum value from day one.
• End-to-End Onboarding – Deployment, integration, and tuning of Sentinel, tailored to your environment
• Full Training Included – Hands-on sessions with your team to ensure
understanding of the platform and service wrap
• Dedicated Support Team – Technical and commercial account managers guide you throughout the process
• Smooth Offboarding Process – We ensure a clean, secure, and fully documented service handover if required - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data can be extracted and safely and securely removed once contract is ending.
- End-of-contract process
-
As part of our Managed Sentinel Detection and Response service, a clear and transparent exit plan is established during the contract. Upon termination, we ensure a secure and well-documented handover.
• Defined Exit Strategy – Exit options and timelines are outlined in advance to ensure a smooth transition
• Secure Data Handling – All customer data held by us is securely deleted at the end of the contract, except where retention is required for legal or
contractual obligations
• Support During Offboarding – Our team will assist with decommissioning
Sentinel configurations and providing any necessary documentation, where required
• Compliance-Focused – All data handling follows UK data protection
regulations and industry best practices
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile apps are designed to offer core functionalities similar to the web version, such as ticket management, customer interactions, and task assignments. However, some advanced features available on the web interface may be limited or absent in the mobile versions.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Portal and dashboard access for all clients.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Our ITSM has undergone usability testing to support accessibility for users leveraging assistive technologies. This includes compatibility checks with screen readers such as NVDA and JAWS, as well as keyboard-only navigation and high-contrast modes. It follows Web Content Accessibility Guidelines (WCAG) principles in its design to ensure key functionality—such as ticket management, navigation menus, and form inputs are operable using assistive tech.
- API
- No
- Customisation available
- Yes
- Description of customisation
- Customised ticket response format and reporting available.
Scaling
- Independence of resources
- Our Managed Sentinel Detection and Response service scales effortlessly with your environment, leveraging Microsoft Sentinel’s cloud-native architecture. Priced per device, it adapts to your organisation’s size and complexity. Designed to handle surge events, Sentinel processes increased log volumes during breaches, including activity spikes of 1000%. With no bottlenecks, detection, correlation, and response remain effective under high load. Communicate’s SOC monitoring service uses automation to prioritise and triage alerts quickly. The service is backed by Azure’s elastic cloud infrastructure, ensuring performance during critical incidents, and can scale based on device count, complexity, and threat event size.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Monthly management reports will be sent from our SOC to you so you can see suspicious incidents that have been raised, their status and what action was taken.
Reports will include key SOC metrics such as:
• Total alerts triaged by SOC
• Total alerts with SOC responses
• Total critical alerts
• SLA Adherence
• Average first response time
• Sentinel specific metrics
You can speak with our team to discuss bespoke reporting if this is a requirement. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Optional Support service available but no third parties as standard
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Can be exported to CSV or PDF
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Data resilience, business continuity and disaster recovery in accordance with ISO27001.
Service uptime of over 99%.
Communicate can guarantee availability of Managed Detection and Response service, however Microsoft Sentinel’s availability is not guaranteed as part of this service. - Approach to resilience
-
Data resilience, business continuity and disaster recovery in accordance with
ISO27001.
Multiple resilient data centres and locations across the UK, with full remote working
policies allow for SOC services to maintain availability during unexpected scenarios. - Outage reporting
- Email/Phone
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- VPN or MFA
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 11 February 2025
- What the ISO/IEC 27001 doesn’t cover
- Scope for ISO27001: Supply and support of IT, telecoms and cyber-security products and services across the UK and Europe.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
As a cyber security company, we have many policies to adhere to various standards including but not limited to ISO27001.
Some examples of policies include:
• Disaster Recovery
• Business Continuity
• Approves Apps
• Clear Desk Policy
• ISMS
• Physical Security
• Document Classification
• Config Management
• Interested Parties
• Management System Policy
• Legal Register
• Password Policy
• Patching Policy
• Remote Working
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- In accordance with ISO27001 compliance.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We assess potential threats through regular vulnerability scans, threat intelligence feeds, and security advisories (e.g., NCSC, vendor bulletins). Critical and high vulnerabilities (CVSS ≥ 7.0) are patched within 14 days, and lower risks on a scheduled basis. Patches are tested in staging before production deployment, with emergency patching procedures for zero-days. We source threat intelligence from CVE databases, security communities, and CERTs. This approach aligns with ISO/IEC 27001 and Cyber Essentials Plus requirements for timely and risk-based vulnerability management.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- A fully Managed UK Based SOC with EDR/XDR/SIEM, IPS, NGFW to utilise protective monitoring against advanced threats.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident management approach aligns with NIST framework
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
50% reduction in non-renewable energy usage achieved in 2023. Actively working toward Net Zero by 2030 in line with government targetsEqual opportunity
We partner with veteran resettlement organisations and neurodiverse hiring initiativesWellbeing
Invest in mental health and work-life balance for staff, aligning with the government's Good Work Plan
Pricing
- Price
- £3.22 to £5.99 a device a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A full free trial can be enabled for clients wishing to test our service on a number of servers/endpoints