Skip to main content

Help us improve the Digital Marketplace - send your feedback

COMMUNICATE TECHNOLOGY LIMITED

Sentinel Managed SOC Detection and Response

We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.

Features

  • Microsoft Sentinel Detection and Response
  • Managed Detection and Response (MDR)
  • Extended Detection and Response (XDR)
  • Endpoint Detection and Response (EDR)
  • Automated Incident Response
  • 24/7 Managed SOC
  • Incident Handling, Investigation and Tuning
  • Threat Hunting and Threat Intelligence
  • Data Sources Onboarding Support
  • Rule and Playbook Creation

Benefits

  • Fully Managed 24/7 Cyber Defence
  • Fixed Pricing with No Hidden Costs
  • Unlimited Alerts and Response Actions
  • 24/7/365 UK Based Operations and Monitoring
  • Unlimited Threat Hunting
  • Rapid Response and Threat Containment Included
  • 24/7 Incident Helpline
  • Scalable to Councils of Any Size
  • Public Sector Expertise
  • Dedicated SOC and Account Management Team

Pricing

£3.22 to £5.99 a device a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jed.wrigley@communicate.technology. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 0 8 8 1 1 9 0 6 6 3 8 1 0 3

Contact

COMMUNICATE TECHNOLOGY LIMITED Jed Wrigley
Telephone: 08004048888
Email: jed.wrigley@communicate.technology

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Our Managed Detection and Response service for Microsoft Sentinel protects any IT environment, including cloud services (public, private, hybrid), data centres, on-premises systems, and multi-platform environments like Microsoft 365, Azure, AWS, Google Cloud, VMware, and more. It provides unified visibility and supports custom and legacy systems.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Pricing is based on a per-device/endpoint model. Clients must provide Communicate SOC access to all relevant solutions for monitoring, detection, and response. Share login details for monitoring solutions and notify of authorised users needing access to the Managed SOC ticketing system. Ensure client representation at implementation meetings. Approval is required for all playbook scenarios before active response actions are taken. Incident response outside retainer hours is subject to standard fees. PII and PCI data must be obfuscated before sending to the Managed SOC. For dedicated PCI services, contact your account manager for assistance.
System requirements
  • Provide necessary Microsoft licensing and tools to support Managed SOC.
  • Assist with installation, setup, and configuration of vendor tools.
  • Ensure systems meet Microsoft Sentinel’s minimum integration requirements.
  • Open necessary firewall ports to support the Managed SOC service.
  • Configure data sources for integration with monitoring solutions.
  • Provide resources for integrating the Managed SOC service successfully.
  • Ensure encryption is applied to all Managed SOC integrations.
  • Offer remote access to Communicate for configuration and support.
  • Provide browser access to the Managed SOC ticketing system.
  • Maintain system functionality and ensure network capacity supports service.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Refer to SLAs within service definition document
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Refer to SLAs within service definition document.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide a seamless onboarding experience, managed by our dedicated technical specialists and account management team. From initial planning through to full
deployment, configuration, and training, we ensure your Microsoft Sentinel environment
is set up to deliver maximum value from day one.
• End-to-End Onboarding – Deployment, integration, and tuning of Sentinel, tailored to your environment
• Full Training Included – Hands-on sessions with your team to ensure
understanding of the platform and service wrap
• Dedicated Support Team – Technical and commercial account managers guide you throughout the process
• Smooth Offboarding Process – We ensure a clean, secure, and fully documented service handover if required
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Data can be extracted and safely and securely removed once contract is ending.
End-of-contract process
As part of our Managed Sentinel Detection and Response service, a clear and transparent exit plan is established during the contract. Upon termination, we ensure a secure and well-documented handover.
• Defined Exit Strategy – Exit options and timelines are outlined in advance to ensure a smooth transition
• Secure Data Handling – All customer data held by us is securely deleted at the end of the contract, except where retention is required for legal or
contractual obligations
• Support During Offboarding – Our team will assist with decommissioning
Sentinel configurations and providing any necessary documentation, where required
• Compliance-Focused – All data handling follows UK data protection
regulations and industry best practices

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile apps are designed to offer core functionalities similar to the web version, such as ticket management, customer interactions, and task assignments. However, some advanced features available on the web interface may be limited or absent in the mobile versions.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Portal and dashboard access for all clients.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Our ITSM has undergone usability testing to support accessibility for users leveraging assistive technologies. This includes compatibility checks with screen readers such as NVDA and JAWS, as well as keyboard-only navigation and high-contrast modes. It follows Web Content Accessibility Guidelines (WCAG) principles in its design to ensure key functionality—such as ticket management, navigation menus, and form inputs are operable using assistive tech.
API
No
Customisation available
Yes
Description of customisation
Customised ticket response format and reporting available.

Scaling

Independence of resources
Our Managed Sentinel Detection and Response service scales effortlessly with your environment, leveraging Microsoft Sentinel’s cloud-native architecture. Priced per device, it adapts to your organisation’s size and complexity. Designed to handle surge events, Sentinel processes increased log volumes during breaches, including activity spikes of 1000%. With no bottlenecks, detection, correlation, and response remain effective under high load. Communicate’s SOC monitoring service uses automation to prioritise and triage alerts quickly. The service is backed by Azure’s elastic cloud infrastructure, ensuring performance during critical incidents, and can scale based on device count, complexity, and threat event size.

Analytics

Service usage metrics
Yes
Metrics types
Monthly management reports will be sent from our SOC to you so you can see suspicious incidents that have been raised, their status and what action was taken.
Reports will include key SOC metrics such as:
• Total alerts triaged by SOC
• Total alerts with SOC responses
• Total critical alerts
• SLA Adherence
• Average first response time
• Sentinel specific metrics
You can speak with our team to discuss bespoke reporting if this is a requirement.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Optional Support service available but no third parties as standard

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Can be exported to CSV or PDF
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Data resilience, business continuity and disaster recovery in accordance with ISO27001.
Service uptime of over 99%.
Communicate can guarantee availability of Managed Detection and Response service, however Microsoft Sentinel’s availability is not guaranteed as part of this service.
Approach to resilience
Data resilience, business continuity and disaster recovery in accordance with
ISO27001.
Multiple resilient data centres and locations across the UK, with full remote working
policies allow for SOC services to maintain availability during unexpected scenarios.
Outage reporting
Email/Phone

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
VPN or MFA
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
11 February 2025
What the ISO/IEC 27001 doesn’t cover
Scope for ISO27001: Supply and support of IT, telecoms and cyber-security products and services across the UK and Europe.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
As a cyber security company, we have many policies to adhere to various standards including but not limited to ISO27001.
Some examples of policies include:
• Disaster Recovery
• Business Continuity
• Approves Apps
• Clear Desk Policy
• ISMS
• Physical Security
• Document Classification
• Config Management
• Interested Parties
• Management System Policy
• Legal Register
• Password Policy
• Patching Policy
• Remote Working

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
In accordance with ISO27001 compliance.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We assess potential threats through regular vulnerability scans, threat intelligence feeds, and security advisories (e.g., NCSC, vendor bulletins). Critical and high vulnerabilities (CVSS ≥ 7.0) are patched within 14 days, and lower risks on a scheduled basis. Patches are tested in staging before production deployment, with emergency patching procedures for zero-days. We source threat intelligence from CVE databases, security communities, and CERTs. This approach aligns with ISO/IEC 27001 and Cyber Essentials Plus requirements for timely and risk-based vulnerability management.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
A fully Managed UK Based SOC with EDR/XDR/SIEM, IPS, NGFW to utilise protective monitoring against advanced threats.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident management approach aligns with NIST framework

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

50% reduction in non-renewable energy usage achieved in 2023. Actively working toward Net Zero by 2030 in line with government targets

Equal opportunity

We partner with veteran resettlement organisations and neurodiverse hiring initiatives

Wellbeing

Invest in mental health and work-life balance for staff, aligning with the government's Good Work Plan

Pricing

Price
£3.22 to £5.99 a device a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A full free trial can be enabled for clients wishing to test our service on a number of servers/endpoints

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jed.wrigley@communicate.technology. Tell them what format you need. It will help if you say what assistive technology you use.