Skip to Main Content

Scroll

Managed SOC

Comprehensive cyber security coverage in a single package.

Our Approach

A managed Security Operations Centre (SOC) has fast become an essential part of an organisations Cyber security strategy in order to reduce the level of exposure of IT systems to both internal and external risks.

Managed Security Services diagram

Managed Security Services

SIEM and Log Management

Our extensive reporting systems will give organisations the ability to correlate, analyse and securely store any event data from the entirety of your network.

Asset Discovery

Our comprehensive system will scan your network and provide unique reports to show exactly who is connected to your environment as well as what is connected at all times.

Vulnerability Management

Mondas' in depth Vulnerability management tools will allow organisations to identify, classify and mitigate any cyber threats to your assets across your entire network.

Intrusion Detection

Our dedicated Intrusion Detection and response tool provides organisations with built in host, network and cloud intrusion detection technologies in order to detect and respond to threats faster.

Endpoint Detection and Response (EDR)

Our extensive EDR security solution will continuously monitor an organisation's endpoints, both in the cloud and on premise, to detect any threats or changes to critical files giving you greater peace of mind.

Behavioural Monitoring

Mondas' User Behavioural Analytics (UBA) gives organisations the ability to track actors and assets within your environment, identifying and alerting you to any suspicious behaviour, user activities or compromised system.

Dark Web Monitoring

We check your corporate identity, employee, user and customer credentials against the largest breached datasets in order to identify stolen passwords before cyber criminals have the chance to use them.

Security and Compliance Reporting

Mondas' system provides you with purpose built, customisable reports meeting regulation standards and compliance frameworks (ISO27001, PCI DSS, Cyber Essentials etc).

Our Managed SOC service combines our most popular managed services into a single package to provide comprehensive cyber security coverage at a very attractive price.

Diagram of the Mondas SOC Service package

Tap to enlarge

How we work

In order to provide a world class service at an affordable price we utilise a blended-shore model for service delivery.

Diagram of the How We Work modal

Client

Client satisfaction isn’t just important to us, it is the only metric we use to measure the success of our business. We know that every client is unique which is why we can tailor every element of our service to seamlessly integrate with your business.

  • The goals and needs of our clients are at the center of all decision making.
  • We like to understand every client’s business so we can provide the best possible service.
  • We strive to over-deliver on our promises in order to exceed our clients expectations.
  • Our aim is to be seen not just as a security service provider, but a trusted security partner.

Service Delivery Manager

We know communication is key to providing an excellent service and building up long term partnerships. This is why all clients are assigned a dedicated service delivery manager who will stay with them for the duration of the contract.

  • Acts as the single point of contact for the client for anything related to the service.
  • Attends regular onsite client service review meetings against agreed SLAs.
  • Has full autonomy to ensure successful outcomes.
  • Stays with the client for the duration of the contract.

Client Success Team

We understand that good communication is essential in providing a great customer experience which is why our customer success team members are all based in the UK and provide all of the core client facing roles either onsite or remotely.

  • Provides onsite support during important project phases like implementation, service improvement and knowledge transfer.
  • Assesses and proposes service improvement plans based on market trends.
  • Identifies issues and offers solutions appropriate to clients’ agenda.
  • Delivers successful outcomes and builds trusted relationships.

SOC Manager

As well as being responsible for the day to day running of the SOC office, our SOC Manager also acts as the highest escalation point for incident response and also works closely with the Red Team and Penetration Testers to ensure our clients systems are kept secure.

  • Acts as the single point of contact between the Customer Success Team and the SOC team.
  • Provides the Customer Success Team with suggestions for technical service improvements.
  • Responsible for implementing new service requests.
  • Produces detailed service reports on a daily / weekly / monthly basis.

Security Operations Center

Our 24/7/365 Cyber Security Operations Centre is strategically based in the beautiful city of Seville, where we are able to recruit and develop cyber security graduates from its world class university.

  • Provides all managed services to the highest standard 24x7x365.
  • Ensures all technology is continually updated with the latest threat intelligence and configuration standards.
  • Defines high quality capability standards.
  • Data is processed and stored on secure AWS servers and does not leave the United Kingdom, or our clients’ region of choice, at any time.

Continual Service Improvement

We follow the ITIL methodology for continual service improvement which we implement in a way that gives the best outcomes for our clients while minimising the impact on their business processes.

  • Regular service reviews provide an opportunity to listen to client feedback and suggest potential improvements.
  • The client success team defines the strategy for improvement and identifies success metrics.
  • The SOC Manager gathers, processes and reviews the data and provides analysis to the Service Delivery Manager.
  • The Service Delivery Manager reports this analysis at the next service review meetings and all agreed improvements are implemented.