ACCELERATOR WORKSHOPS

Secure identities and access WORKSHOP

C‐SOCaaS is a service that provides monitoring,
detection and analysis of cyber security threats.

This service goes above and beyond by proactive detention of advanced targeted attacks that have gone undetected by your existing perimeter controls.

What is the C‐SOCaaS?

Small Business Cybersecurity Operations Center as a Service, or C‐SOCaaS, are great security operations (SecOps) services that manage and monitor  logs, devices like firewalls, servers, routers, switches, wireless access points, virtual private networks (VPNs), endpoint protection (EPP), endpoint  detection and response (EDR) and Office 365 tenants – clouds, network and assets for internal security and IT teams.

C‐SOCaaS – Small Business are the complete, intelligent Alert Global Plans that provides monitoring, detection and analysis of cyber security threats, with the use of the Microsoft 365 Lighthouse to help secure and manage devices, data and users at scale for Small and Medium Business (SMB) customers. C‐SOCaaS also shows how it leverages and relates to the value propositions of Azure cloud services, and the offering provides managed services for your environment.

The Alert Global C‐SOCaaS Small Business Plans is offered in 3 levels: (Prices vary depending on the company’s size.)

  • Essential: which the customer has up to 300 users;
  • Standard: which the customer has between 301 to 600 users; and
  • Premium: which the customer has between 601 to 1000 users.

*Above 1000 you must opt for the Corporate Plans. Note: The main difference between the Levels is the company’s size. However, in the “Essential” you can choose between paying a fixed amount per user or the complete package for 300. For “Standard” or “Premium”, you will pay a unique total amount for each one.

C‐SOCaas Small Business Services:

  • Cloud Monitoring;
  • Asset Discovery;
  • Intrusion Detection;
  • Incident Response;
  • Behavior Analysis;
  • Advanced Reporting;
  • Extension of your team;
  • Vulnerability Assessment;
  • SIEM and Log Management;
  • No additional hardware;
  • Integration with existing systems; 
  • Endpoint Detection and Response.