Fully Managed, 24/7 IT Security. Isn’t this the Protection Your Business Deserves?
With more and more businesses suffering from cyber attacks since the pandemic, organisations are looking to further tighten security to protect their assets and reputations.
The gold standard for safeguarding your business is a security operations centre (SOC). This is a dedicated unit tasked with defending your business and keeping your data and assets safe.
While setting up an SOC in-house is possible, in reality this can be a massive strain on your organisation in terms of strategy, resources, processes and financial planning.
This is why it makes sense to outsource your security service to an experienced and trusted managed security services provider (MSSP) such as Intersys. Find out about our three SOC plans below.
What is SOC as a Service?
Choose Your SOC Package
Silver
- Security operations centre*
- Breach response**
- Perimeter monitoring
- Anti-virus monitoring
- Email filtering
- Microsoft 365 monitoring
- Annual security hardening roadmap
Gold
All Silver Services
Plus
- Office 365 backup
- Application whitelisting and ringfencing
- Privilege access management (PAM)
- Online cyber security training
- Email attack simulation
- Fortnightly security meetings
Platinum
All Gold Services
Plus
- Cyber Essentials Certification
- Endpoint sensor / compliance monitor
- Dark web monitor
- Automated PEN testing
- Security specialist consultancy***
- Secure web gateway
**Up to four breaches per year included, limited to one day of consultancy.
*** Consultancy dependent on requirement. Travel charges may apply for onsite visits outside the Greater London Area.
Our SOC Services in Detail
Click on the headings below to see a more detailed description of what each element of our SOC services includes.
- Security operations centre
Our dedicated team of specialists will configure alerts on your endpoints, servers and cloud environments then monitor those systems responding to alerts in real time. This ensures you are alerted to any suspicious activities on your network and can stop them before they become a problem. - Breach response
If a data breach has been detected, you will be assigned a dedicated security team to identify what happened, how it happened, and what was accessed. We will then advise you on how to stop it from happening again. - Perimeter monitoring
Next generation firewalls send alerts when: viruses are intercepted; there is an network intrusion attempt; and even when sensitive information gets sent outside the organisation. Intersys will work with the network equipment you have in place or recommend a suitable replacement. - Anti-virus monitoring
We will manage your antivirus of choice or install our recommended solution. Alerts for all computers will be directed to the SOC desk and issues can be identified and dealt with before they can spread. - Email filtering
Best-in-class email filtering will block email malware, spam and phishing emails. - Microsoft 365 monitoring
Leveraging the power of Microsoft’s Cloud app security, our security operations centre will create monitors and respond to alerts for: access from an unusual country; impossible travel activity; mass file downloads or deletions; at risk users; email forwards; and more. We will investigate and alert on anything we find suspicious. - Annual security hardening roadmap
At the start of our engagement, an Intersys strategic consultant will work with your IT team to identify areas in need of hardening and put together a plan to strengthen your network and protect your data. - Office 365 backup
Intersys works with Acronis to provide best-in-class backup from Microsoft 365 to ensure that your emails and files stored in the cloud are safe from any errors or accidental deletion. Clients often require this service for compliance purposes. - Zero trust / application whitelisting and ringfencing
Using state-of-the-art application whitelisting technology, our team is able to lock down your computers to ensure that only pre-approved applications can run. This means it is almost impossible for a virus or ransomware to run on one of these machines. - Privilege Access Management (PAM)
Additional administrative permissions can be a weak link in your company’s IT security. However, some software or job roles (such as ‘developer’) require this to function properly. PAM allows administrative access on request, so users can work effectively without compromising your network.
- Cyber Essentials Certification
One of our security specialists will work with your team to help you achieve Cyber Essentials Certification. We will manage the process for you and assist with the steps needed to become compliant. - Endpoint sensor / compliance monitor
We install specialised software on each computer that scans the device software, checks the version and identifies any vulnerabilities. It also scans the computer for vulnerable sensitive information such as passwords, credit card information or Personally Identifiable Information (PII). Intersys staff will identify the most at risk computers and work with your team to rectify any issues found. - Dark web monitor
Our dark web service scans hacker forums and databases looking for references to your users’ information. As soon as information about your organisation is found on the dark web, we will work with your team to ensure the accounts are secured and no longer at risk. - Automated PEN testing
We set up automatic vulnerability scans for your network perimeters and OWASP scans for your website to look for vulnerabilities. Our team will review the findings with you and advise on steps to remediate any issues found. - Security specialist consultancy
Our security specialists can undertake hardening projects for your network, either working with your IT team or managing the project themselves. - Secure web gateway
Get granular control over your devices wherever they are in the world. We provide unified control over all network traffic using web and DNS filtering, so traffic on all machines is reviewed before it hits the endpoint. - Online cyber security training
Your staff will have access to a customised training portal with over 50 cyber security training modules they can complete at their leisure. You can even assign different courses to your specialist staff, to ensure they have the relevant training. Each course consists of a short video followed by a multiple choice quiz. - Email attack simulation
To ensure your staff are able to spot suspicious emails, our team will simulate phishing attacks. We can monitor staff that have clicked on these bogus links and entered in credentials. This approach can be integrated with cyber security training to ensure staff vulnerable to attacks receive extra attention – and ALL of your staff can spot a malicious email. - Regular security meetings
Our SOC specialists will meet with your staff on a regular basis (monthly for Gold packages and fortnightly for Titanium) to review SOC alerts, identify trends or weak points in the network, and advise on steps to make your network more secure.
Educating Your People: a Crucial Part of an SOC Service
One of your best defences against cyber criminals is a security conscious workforce.
As a part of our Gold and Platinum security operations centre services, our Cyber Security Training Programme raises your employees’ awareness, so they help to keep the bad guys out.
Our programme provides:
- Cyber security risk assessments, to quantify the profile of and threat to your user base.
- Tailored security awareness content, including interactive modules, games, and simulated phishing campaigns.
- Dedicated ‘phish alert’ buttons to raise awareness of threats.
- A Virtual Risk Officer to provide feedback and insight into your employees’ cyber-risk.
- Monthly reports providing insights into the effectiveness of your security plan and actionable next steps.
Why Should I Trust You with My Data?
Working with an MSSP to set up a security operations centre means a third party is effectively holding the keys to your business. You have to be able to trust them.
Here’s why you can trust Intersys:
A long-term security provider. We have 25 years of commercial and NGO experience across many sectors, offering you up-to-date and industry-leading protection.
Industry accredited. Our people are highly experienced, ISO 27001-certified, data protection and GDPR-aligned IT security experts.
- UKAS accredited ISO 27001
- WatchGuard Gold Partner
- EC-Council CEH (Certified Ethical Hacker)
- Microsoft Gold Partner
- Cyberoam Gold Partner
- CompTIA Security+
- CompTIA Network+
- BCS CISMP (Certificate in Information Security Management Principles)
- Computer forensics and investigations (postgraduate course)
Shouldn’t My In-House IT Team or Managed IT Support Provider be Handling This?
In a word, no. It’s a common misconception that IT support – internally or as an outsourced service – will deal with all things security related. They won’t.
While your IT support team should implement cyber security best practice on set up, it is highly unlikely their service will include 24/7 monitoring to detect breaches, or monitoring of your employees’ use of your systems.
The best way to secure your systems is via a security operations centre.
Terms and conditions
SOC services include the licensing cost of our remote support and network monitoring software as well as our helpdesk system.
Prices reduce with scale. These services include the licensing cost of our network and user monitoring software as well as attack simulation, Dark web monitoring and external vulnerability scanning tools.
To ensure the best value from the Microsoft 365 monitoring an E5 or Cloud App Security and Azure AD Premium license is required (expected to be delivered as part of the infrastructure).