🎂  Intersys celebrates 25 years! Read our story

Intersys Logo

Managed IT Support

A Reasonable, Fixed Monthly Fee for All Your IT Needs
Find out more

Consulting Services

The High Level IT Consulting Services You Need to Transform Your Business
Find out more

Cyber Security

A Comprehensive Range of Cyber Security Services for Robust, Industry-Leading Protection
Find out more

IT Solutions

Whatever your IT needs, we'll create a tailormade solution for you
Find out more
You are here: HomeCyber Security ServicesSecurity Operations Centre/SOC as a Service

Security Operations Centre/SOC as a Service

Fully Managed, 24/7 IT Security. Isn’t this the Protection Your Business Deserves?

With more and more businesses suffering from cyber attacks since the pandemic, organisations are looking to further tighten security to protect their assets and reputations.

The gold standard for safeguarding your business is a security operations centre (SOC). This is a dedicated unit tasked with defending your business and keeping your data and assets safe.

While setting up an SOC in-house is possible, in reality this can be a massive strain on your organisation in terms of strategy, resources, processes and financial planning.

This is why it makes sense to outsource your security service to an experienced and trusted managed security services provider (MSSP) such as Intersys. Find out about our three SOC plans below.

What is SOC as a Service?

Intersys provides 24/7 security operations centre services for clients across many industries. With Silver, Gold and Platinum services available, our comprehensive solution is affordable for organisations of all sizes. Our service can include: 

A Comprehensive Security Plan 

Sourcing the right cyber and IP assurance, system monitoring and intrusion protection to defend your organisation.

Microsoft 365 Monitoring 

Including proactively monitoring and enhancing your Secure Score, and actively responding to alerts.

Cloud Access Monitoring 

Deploying internal network monitoring and user activity monitoring, so you know exactly who is accessing your systems.

External Penetration Testing 

Stress testing your systems and ensuring they are robust enough to repel attacks.

Swift Breach Response 

A rapid-response service should a successful breach occur, with urgent on-site assistance.

Compliance Expertise 

Helping to ensure your cyber security strategy is GDPR and industry compliant.

Talk to us about your security

Choose Your SOC Package

All our packages include sophisticated alerting and monitoring of endpoints, servers and cloud environments. We will automatically sign clients up to the National Cyber Security Council (NCSC) Early Warning System. You can find out more about each of the services listed here further below.

Silver Package


  • Security operations centre*
  • Breach response**
  • Perimeter monitoring
  • Anti-virus monitoring
  • Email filtering
  • Microsoft 365 monitoring
  • Annual security hardening roadmap
Gold Package


All Silver Services

  • Office 365 backup
  • Application whitelisting and ringfencing
  • Privilege access management (PAM)
  • Online cyber security training
  • Email attack simulation
  • Fortnightly security meetings
Platinum Package


All Gold Services

  • Cyber Essentials Certification
  • Endpoint sensor / compliance monitor
  • Dark web monitor
  • Automated PEN testing
  • Security specialist consultancy***
  • Secure web gateway
*This service runs from 9am — 6pm weekdays. A 24/7 service can be provided upon request.
**Up to four breaches per year included, limited to one day of consultancy.
*** Consultancy dependent on requirement. Travel charges may apply for onsite visits outside the Greater London Area.

Our SOC Services in Detail

Click on the headings below to see a more detailed description of what each element of our SOC services includes.

  • Security operations centre
    Our dedicated team of specialists will configure alerts on your endpoints, servers and cloud environments then monitor those systems responding to alerts in real time. This ensures you are alerted to any suspicious activities on your network and can stop them before they become a problem.
  • Breach response  
    If a data breach has been detected, you will be assigned a dedicated security team to identify what happened, how it happened, and what was accessed. We will then advise you on how to stop it from happening again.
  • Perimeter monitoring
    Next generation firewalls send alerts when: viruses are intercepted; there is an network intrusion attempt; and even when sensitive information gets sent outside the organisation. Intersys will work with the network equipment you have in place or recommend a suitable replacement.
  • Anti-virus monitoring
    We will manage your antivirus of choice or install our recommended solution. Alerts for all computers will be directed to the SOC desk and issues can be identified and dealt with before they can spread.
  • Email filtering
    Best-in-class email filtering will block email malware, spam and phishing emails.
  • Microsoft 365 monitoring
    Leveraging the power of Microsoft’s Cloud app security, our security operations centre will create monitors and respond to alerts for: access from an unusual country; impossible travel activity; mass file downloads or deletions; at risk users; email forwards; and more. We will investigate and alert on anything we find suspicious.
  • Annual security hardening roadmap
    At the start of our engagement, an Intersys strategic consultant will work with your IT team to identify areas in need of hardening and put together a plan to strengthen your network and protect your data.
  • Office 365 backup
    Intersys works with Acronis to provide best-in-class backup from Microsoft 365 to ensure that your emails and files stored in the cloud are safe from any errors or accidental deletion. Clients often require this service for compliance purposes.
  • Zero trust / application whitelisting and ringfencing
    Using state-of-the-art application whitelisting technology, our team is able to lock down your computers to ensure that only pre-approved applications can run. This means it is almost impossible for a virus or ransomware to run on one of these machines.
  • Privilege Access Management (PAM)
    Additional administrative permissions can be a weak link in your company’s IT security. However, some software or job roles (such as ‘developer’) require this to function properly. PAM allows administrative access on request, so users can work effectively without compromising your network.
  • Cyber Essentials Certification
    One of our security specialists will work with your team to help you achieve Cyber Essentials Certification. We will manage the process for you and assist with the steps needed to become compliant.
  • Endpoint sensor / compliance monitor
    We install specialised software on each computer that scans the device software, checks the version and identifies any vulnerabilities. It also scans the computer for vulnerable sensitive information such as passwords, credit card information or Personally Identifiable Information (PII). Intersys staff will identify the most at risk computers and work with your team to rectify any issues found.
  • Dark web monitor
    Our dark web service scans hacker forums and databases looking for references to your users’ information. As soon as information about your organisation is found on the dark web, we will work with your team to ensure the accounts are secured and no longer at risk.
  • Automated PEN testing
    We set up automatic vulnerability scans for your network perimeters and OWASP scans for your website to look for vulnerabilities. Our team will review the findings with you and advise on steps to remediate any issues found.
  • Security specialist consultancy
    Our security specialists can undertake hardening projects for your network, either working with your IT team or managing the project themselves.
  • Secure web gateway
    Get granular control over your devices wherever they are in the world. We provide unified control over all network traffic using web and DNS filtering, so traffic on all machines is reviewed before it hits the endpoint.
  • Online cyber security training
    Your staff will have access to a customised training portal with over 50 cyber security training modules they can complete at their leisure. You can even assign different courses to your specialist staff, to ensure they have the relevant training. Each course consists of a short video followed by a multiple choice quiz.
  • Email attack simulation
    To ensure your staff are able to spot suspicious emails, our team will simulate phishing attacks. We can monitor staff that have clicked on these bogus links and entered in credentials. This approach can be integrated with cyber security training to ensure staff vulnerable to attacks receive extra attention ­– and ALL of your staff can spot a malicious email. 
  • Regular security meetings
    Our SOC specialists will meet with your staff on a regular basis (monthly for Gold packages and fortnightly for Titanium) to review SOC alerts, identify trends or weak points in the network, and advise on steps to make your network more secure.

Educating Your People: a Crucial Part of an SOC Service

One of your best defences against cyber criminals is a security conscious workforce.

As a part of our Gold and Platinum security operations centre services, our Cyber Security Training Programme raises your employees’ awareness, so they help to keep the bad guys out.

Our programme provides:

  • Cyber security risk assessments, to quantify the profile of and threat to your user base.
  • Tailored security awareness content, including interactive modules, games, and simulated phishing campaigns.
  • Dedicated ‘phish alert’ buttons to raise awareness of threats.
  • A Virtual Risk Officer to provide feedback and insight into your employees’ cyber-risk.
  • Monthly reports providing insights into the effectiveness of your security plan and actionable next steps.

Why Should I Trust You with My Data?

Working with an MSSP to set up a security operations centre means a third party is effectively holding the keys to your business. You have to be able to trust them.

Here’s why you can trust Intersys:

A long-term security provider. We have 25 years of commercial and NGO experience across many sectors, offering you up-to-date and industry-leading protection.

Industry accredited. Our people are highly experienced, ISO 27001-certified, data protection and GDPR-aligned IT security experts.

  • UKAS accredited ISO 27001
  • WatchGuard Gold Partner
  • EC-Council CEH (Certified Ethical Hacker)
  • Microsoft Gold Partner
  • Cyberoam Gold Partner
  • CompTIA Security+
  • CompTIA Network+
  • BCS CISMP (Certificate in Information Security Management Principles)
  • Computer forensics and investigations (postgraduate course)

Shouldn’t My In-House IT Team or Managed IT Support Provider be Handling This?

In a word, no. It’s a common misconception that IT support – internally or as an outsourced service – will deal with all things security related. They won’t.

While your IT support team should implement cyber security best practice on set up, it is highly unlikely their service will include 24/7 monitoring to detect breaches, or monitoring of your employees’ use of your systems.

The best way to secure your systems is via a security operations centre.

Terms and conditions

SOC services include the licensing cost of our remote support and network monitoring software as well as our helpdesk system. 

Prices reduce with scale. These services include the licensing cost of our network and user monitoring software as well as attack simulation, Dark web monitoring and external vulnerability scanning tools.

To ensure the best value from the Microsoft 365 monitoring an E5 or Cloud App Security and Azure AD Premium license is required (expected to be delivered as part of the infrastructure).

Tech Support Assistant

Talk to Us Now

Chat to an expert at the friendly IT company

Intersys were extremely thorough and diligent when it came to identifying risks that could significantly disrupt our operations and in prioritising mitigating actions and proportionate response plans. A highly specialised and professional service which we will continue to use.

Group Financial Controller,
Hummingbird PLC

Intersys did a great job of gathering all the necessary data about our company’s global systems and processes, and then benchmarking it against the expected standards.

Citadel Risk

Intersys designed and implemented our cyber security defences and corporate security protocols to our exacting requirements. Thanks to them, the entire process was pain free and efficiently managed.

AviaSolutions Ltd
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram