• Security Operations Center

    we.catch.threats
  • Service Description

  • Our Security Operations Center (SOC) provides continuous cyber threat monitoring.

    To get started, enter the number of computers you’d like us to protect and select from the available features.

  • Input number of computers and select features

  • Protect Windows, Linux, and Mac computers from threats such as malware, ransomware, memory-based attacks, malicious behavior, and credential harvesting.

    Our monitoring also generates security telemetry and captures key system details to support rapid threat detection and response.

    • Google Workspace or Microsoft 365 
    • The size of the below systems must be relative to the number of computers input above. See our terms and conditions for details.
    • Cyber threat detection within your Microsoft 365 or Google Workspace account. Common threats detected include compromised accounts, malicious emails, and confidential data exposure.

    • Prevent cyber threats in your Google Workspace or Microsoft 365 accounts by allowing us to host or manage the service. We apply industry-standard security configurations and handle your change requests to keep the environment functional and secure.

    • Our hosting price includes coverage of your annual domain registration fee as well as the Microsoft 365 or Google Workspace software licenses.

    • Search for domain availability

    • Network and Networking Services 
    • We monitor any system, service, or device where log data provides threat detection value, including:

      • Network equipment (routers, switches, firewalls)
      • Cloud platforms (AWS, GCP, Azure)
      • Identity services (such as Active Directory)
      • Endpoint security solutions (e.g., Microsoft Defender, Sophos, CrowdStrike)
      • And many other types of systems

      By analyzing these logs for signs of malicious activity, we provide broad visibility across your environment and enable fast detection and response to cyber threats.

    • Vulnerability Detection 
    • We identify vulnerabilities in your systems before attackers can exploit them. This may involve scanning, configuration reviews, or other techniques to uncover risks such as missing patches, insecure settings, and outdated software. The results give you clear visibility into issues that need to be addressed to strengthen your defenses.

    • Data Retention 
    • We retain all data ingested into and produced by our Security Operations Center Platform for one year. This ensures events, vulnerabilities, and threat alerts are available for compliance and historical analysis.

      The monthly price reflects the cost of storing data. Data restoration costs are applied as needed:

      • Restoration fee: $500 per request

      • Data volume fee: $0.50 per GB restored

      • Data accessibility: Restored logs will remain online and accessible for up to 30 days

      • Size cap: Maximum of 1 TB of data can be restored per request

      • Alternatives: Requests exceeding 1 TB, or requiring accessibility beyond 30 days, will require custom pricing

    • Additional Hours 
    • You can bundle additional hours with your Security Operations Center subscription. These hours are led by a Chief Information Security Officer (CISO), with support from other specialists as needed. They can be applied to activities such as risk assessments, program management, business continuity planning, policy development, budgeting, system engineering and support, and vendor management.

    • Other Requirements 
    • Browse Files
      Drag and drop files here
      Choose a file
      Cancelof
    •  
    • Frequently Asked Questions | Contact Us | Terms and Conditions

  • Input your contact information

  • The Service Delivery contact must be the customer and cannot be the reseller unless the reseller is formally the MSP for the customer. In this case, the MSP will be who Threat Angler works with to enable and deliver the service.

  • Frequently Asked Questions | Contact Us | Terms and Conditions

  • Place your order

    You will receive service enablement instructions via email shortly after placing your order
  • prevnext( X )
    Security Operations Center Product Image
    Security Operations Center
    USD for each month
      
  • Should be Empty: