Arctic Wolf Managed Security Operations
Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.
Features
- 24/7 Security Ops - Advanced Threat Detection & Response
- Use your own security tools - endpoint, network, cloud
- Unlimited security telemetry log ingestion & processing
- Log retention: 90 days minimum, 10 years maximum
- Managed vulnerability management across multiple platforms
- Cloud Security Management - AWS, Azure, Google Cloud
- Managed Security Awareness - employee education & testing
- Incident Response - assistance & recovery for security incidents
- Concierge Security Team - enhance your Security Journey
- Security Operations Warranty - $1,000,000 financial help available
Benefits
- Broad visibility across your entire security toolset.
- Supports on-premises, edge/remote, and public clouds.
- Production coverage ready in under 30 days.
- Includes SIEM, SOAR, and other key security technologies.
- 24/7 monitoring, detection, and response with guided remediation.
- Concierge experience - named experts enhancing your security posture.
- Includes in-house threat intelligence and AI/ML detection.
- Lower cost and complexity vs. Managed SIEM solutions.
- Powerful unified UI - access data, reports, IR plans, etc.
- Align your organization with NIST CSF & CIS v8.
Pricing
£16.20 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 8 7 5 4 2 4 0 4 3 5 8 2 0 3
Contact
TheTechForce Limited
Jai Aenugu
Telephone: 01224516181
Email: jai@techforce.co.uk
Service scope
- Service constraints
- No
- System requirements
-
- Supported Identity & EDR technology installed
- Endpoint Agent & Network Sensor installed for enhanced monitoring
- API & Syslog access to supported-tooling on-prem & public cloud
- Log sources should be independent to buying organisation
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
SLOs offered to customers can be found in the MDR Solutions Terms located at https://arcticwolf.com/terms/. As of date of response, the following SLOs are offered 24x7x365 via ticket platform (email/website ticket):
Emergency outbound - triaged & true positive: 30 minute response after discovery
Non-Emergency outbound: 2 hour response after discovery
Inbound Emergency Call in has an SLO of 5 minute response - 24x7x365 - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
-
Arctic Wolf provides Concierge-focused support to all customers, regardless of size or spend.
Our model includes full onboarding of the solution with our onboarding organisation, comprehensive 24x7 advanced threat detection & response from our customer SOC, propietary threat intelligence & detection and response engineering from Arctic Wolf Labs, and proactive Security Posture Reviews & proprietary microassessments of security enhancements within your organisation from your named Concierge Security Team (CST). Each customer is also aligned to a Customer Success Manager for account management, checkins and healthchecks. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Arctic Wolf offers a white glove installation service with Arctic Wolf Concierge
Onboarding. It streamlines the deployment of the security operations solutions before the service begins.
Every customer is assigned a Concierge Onboarding team that coordinates every step of
the process–from gathering requirements, to portal access,
to testing and validation. This typically takes 30 days before solution acceptance and customisation. This is typically delivered online and remote by Arctic Wolf resources, supported by user documentation available at https://docs.arcticwolf.com - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- At time of or immediately before expiration, Arctic Wolf can support a manual transfer of all retained raw log data using cloud object transfers, specifically Amazon Web Services S3 bucket transfer. The customer will be responsible for the target bucket and associated costs.
- End-of-contract process
- After the customer has optionally extracted the data, we ensure data is rendered unreadable.
Using the service
- Web browser interface
- Yes
- Using the web interface
- N/A
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- N/A
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- This is handled by the underlying public cloud our technology platform is architected within. Arctic Wolf is architected to be a multi-tenanted, highly scalable service for thousands of customers. More information available on request.
- Usage notifications
- Yes
- Usage reporting
-
- SMS
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- HTTP request and response status
- Memory
- Network
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Arctic Wolf
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- AWS Data Center Physical Controls (inherited), AWS Data Encyption (configured), Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- N/A
Availability and resilience
- Guaranteed availability
- At this time and as a standard operating practice, we do not include availability SLOs in our solutions agreement.
- Approach to resilience
- Handled by the underlying cloud provider. More information available on request.
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- 2-Factor Phishing Resistant Authentication for all users; VPN access to Production Environment
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Incident Response and Cyber Jumpstart modules
- ISO/IEC 27001 accreditation date
- N/A
- What the ISO/IEC 27001 doesn’t cover
-
Yes
Incident Response and Cyber Jumpstart modules as well as any sub-processor/third party data center facilities/platforms are not covered - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Yes - SOC 2, mapped to HITRUST CSF Type 2.
- Incident Response, Cyber Jumpstart not covering third-party facilities/platforms.
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- SOC2 Type II and ISO/IEC 27001
- Information security policies and processes
- Arctic Wolf maintains Information Security Policies, Standards and Procedures as part of our Information Security Management System (ISMS). which is implemented based on AICPA's Trust Services Principles and ISO 27001/27002 as well other leading industry frameworks.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- AICPA's Trust Services Principles and ISO/IEC 27001
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
AICPA's Trust Services Principles and ISO/IEC 27001
Regular Vulnerability Assesments by internal and external parties and Annual Penetration Test by an independent third party. Findings are addressed in line with AW security policies and standards - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Arctic Wolf Managed Detection and Response services are used.
- Incident management type
- Supplier-defined controls
- Incident management approach
- AICPA's Trust Services Principles and ISO/IEC 27001
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Arctic Wolf Networks, Inc., a global leader in cybersecurity, is dedicated to its mission to
“End Cyber Risk”. As the company works relentlessly toward this goal for our customers,
we are equally committed to conducting business responsibly and purposefully - operating
our business in accordance with industry-accepted standards and applicable laws and
regulations. We focus our efforts to do our part in minimizing our overall environmental
impact, educate and empower our employees, provide free cybersecurity awareness
training and resources to help our communities stay safe in an everchanging threat
landscape through the Pack Gives Back, encourage employee volunteerism, foster
diversity, equity and inclusion, and establish sustainability targets that will keep us
accountable to our goals and strive for continual improvement.Equal opportunity
We are committed to fostering a diverse, equitable and inclusive workplace where all members of our Pack feel safe and have a sense of belonging. We believe that cultivating diverse and inclusive teams with different perspectives helps us examine ideas from multiple angles, generate competitive business insights, and ultimately make better decisions. Learn more about our Diversity, Equity, Inclusion & Belonging Initiatives. https://arcticwolf.com/company/careers/diversity-equity-inclusion-and-belonging/
Pricing
- Price
- £16.20 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No