Cyber Security Operations (SOC) Managed Services
CYBER DEFENCE. We specialise in providing the best security operations capabilities and practices. We reduce the risk from cyber threats and protect organisations from successful cyber-attacks. We offer a service to develop, enhance and operate your security operations activities. PREPARE DETECT RESPOND.
Features
- Deliver a security operations centre managed service.
- Analyse security events to identify threats and indicators of compromise.
- Use your systems and tools, for example Sentinel, Defender, Copilot
- Deploy tools and processes for an ongoing vulnerability management capability.
- Raise user awareness and engagement for a "cyber first" culture
- Define and operate incident response procedures.
- Carry out testing of cyber incident preparations.
- Establish a security operating baseline to help detect abnormal behaviour.
- Monitor the external environment for relevant and actionable threat intelligence.
- Provide regular reporting on the service operation.
Benefits
- Proactively monitor the environment to detect potential security incidents early.
- Improve your security posture and reduce risk of cyber-attacks.
- Be prepared with a pre-defined security incident process in place.
- Know your cyber incident management process is tried and tested.
- Enable separation of duties and independence from your internal resources.
- SLAs for monitoring and incident response activities.
- Exploit and leverage your existing security tools and systems investment.
- Use our knowledge and experience of security operations best practices
- Take an informed risk based approach to vulnerability management.
- Help meet compliance requirements and demonstrate maturity in health checks.
Pricing
£850 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 5 5 4 4 0 4 5 8 1 9 9 9 9 1
Contact
BLUESOC LIMITED
Richard Styles
Telephone: 07709 425113
Email: Richard.Styles@BlueSOC.co.uk
Planning
- Planning service
- Yes
- How the planning service works
- We can assist with requirement definition, developing solution options and recommendations, then producing solution architecture designs and implementation plans.
- Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
- We can train customer's staff as skilled SOC analysts and incident managers.
- Training is tied to specific services
- Yes
- Services the training service works with
-
- Micrososft security services
- Tools for cyber defence
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
- We can help organisations migrate from legacy security services to modern cloud based services.
- Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- No
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security incident management
- Security audit services
- Other
- Other security services
-
- Security project management
- Awareness and engagement
- Vulnerability management
- Chief Information Security Officer
- Accreditation submissions
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
- Hosting or software provided by a third-party organisation
- How the support service works
-
Microsoft Security services including Sentinel, Copilot for Security, and the Defender product suite.
Tenable vulnerability management product suite
Service scope
- Service constraints
- None.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within one working day normally. There is an SLA agreed for incident response.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- We use Microsoft Teams ususally.
- Support levels
-
The scope of the managed service can be defined to cover the level of support required by the client.
Included is a monthly service management review with the Service Lead or Service Account Manager.
The workload is dependent on the customer’s requirements. The Cyber Security Operations managed service is typically supported by a Cyber Security Service Lead and Cyber Security Analysts or Engineers.
The service charge is based on the number of FTEs required to set up and operate the service. We commence the service with a minimum of one FTE.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
The service can be provided remotely therefore reducing the organisation's carbon footprint.Covid-19 recovery
Our service can be delivered remotely thereby reducing the risk of Covid-19 transmission.Tackling economic inequality
The centre of gravity for the business is in Manchester, creating and bringing high quality skills and jobs to the North West of England.Equal opportunity
We are a small company and awarding us a contract will allow us to continue growing and employ people from diverse backgrounds.Wellbeing
We believe our service makes IT environments safer and will improve the level of maturity in security operations across the SME market. This reduces the risk faced from cyber threats whether they are opportunistic attacks or advanced persistent threats from criminals or state sponsored organisations. Ultimately it helps to protect trust with the general public who are concerned about cyber-crime.
Pricing
- Price
- £850 a unit a day
- Discount for educational organisations
- No