Get in Touch
Get in Touch
Give us a call AUS: 1800 411 565 NZ: 0800 895 157 or fill out the contact form below:
Do you need Security Operations Center (SOC) Support?
Our cyber security team are responsible for monitoring and improving our clients cybersecurity posture by identifying, preventing, detecting, and responding to threats. This service has now been extended to be available 24 hours a day 7 days a week for our clients. The team monitor identities, endpoints (e.g. workstations), servers, network applications, websites and other systems to uncover and protect against potential cyberattacks in real time.
Our team provide proactive security management and solutions using the latest threat intelligence to allow us to identify and address system or process vulnerabilities before attackers could exploit them.
Our SOC point of difference is we work across multiple devices and software across the entire digital attack surface and not limited to a single vendor.
Our SOC Services include
Continuous Monitoring & Threat detection
Reducing the attack surface
Asset discovery and tool inventory
Log management
Incident response
What is SOC Looking For?
Cyber Security Team are looking for threats in your environment from a multitude of devices, systems and applications. The team will be reporting on firewalls, workstation & server endpoints, website & web applications, alerting & protection, cloud services and data exfiltration from your network. Learn more about firewalls, workstation & server endpoints and cloud monitoring below.
Firewalls
Monitor and check firewall patching availability and new firewall vulnerabilities.
Workstation and Server Endpoints
Cloud Monitoring
Supplier and Product Vulnerability Hunting
What We Offer
Feature |
Basic Security |
SOC Business Hours |
SOC 24/7 |
---|---|---|---|
Standard Business Hours (8am – 6pm) | • | • | • |
24/7 Supported Hours | • | ||
Monitoring Unusual Activity Reports | • | • | • |
Unusual Login Attempts & Risky User Alerts | • | • | • |
Monitor Email Service | • | • | • |
Review 365 Secure Score, New Recommendations & Vulnerabilities | • | • | • |
Monitoring AV / Malware Threat Alerts | • | • | • |
Access Control Management/MFA Reporting | • | • | • |
SharePoint Disk Usage & Trends | • | • | • |
Data Loss Protection (file access) Monitoring* | • | • | |
Active Human Eyeball Monitoring and Response/Actions | • | • | |
Microsoft 365 Defender & Threat Intelligence | • | • | |
Firewall Monitoring, Login & Firewall Rule Change Alerting | • | • | |
Workstation Patching Reporting | • | • | |
Manage Engine 3rd Party Patching* | • | ||
Threatlocker* | • | ||
Email Integrity Status Checks & Reporting | • | ||
Cloudflare DNS & WAF Monitoring & Reporting* | • | ||
CloudFlare Zero Trust Monitoring & Reporting* | • | ||
Wordfence WAF Monitoring & Reporting* | • | ||
Veeam 365 Backup Enhanced Reporting | • | ||
Azure Backups Enhanced Reporting* | • | ||
MIT Red Team Updates | • | ||
NSOC MIT Vulnerability Hunting and Actions | • | ||
NSOC Monthly Reporting and Actions | • | ||
Security Awareness Video | • | ||
Darkweb Monitoring & Reporting | • | ||
BullPhish Phishing Simulation | • |
*Monitoring and reporting is completed if client has paid subscriptions, services or configuration setup for these products.
Example SOC Report
Transparency and detailed reporting are at the heart of our SOC services. We understand that having access to clear, comprehensive insights is essential for managing and securing your network. Our SOC reports are designed to provide a thorough analysis of your network’s security posture, including incident details, system vulnerabilities, and actionable recommendations.