Security Operations Center (SOC) Services
What is Vintage doing to improve the security of my business?
By January 1, 2023, Vintage will require all clients to subscribe to the Vintage SOC Services offering. We have already begun to phase in these services for some clients. If you want to prioritize your business for SOC Services, please contact us. If we don’t hear from you, we will contact you in 2022 and notify you when we are implementing
What is SOC Services?
The function of the Security Operations Center (SOC) is to monitor, prevent, detect, investigate, and respond to cyber threats around the clock. A managed SOC offers external cybersecurity experts that monitor your logs, devices, cloud environments, and network for known and evolving advanced threats.
Why is SOC Services important to my business?
- Cybercrime is up 600% since the Covid-19 pandemic.
- Malware increased 358% in 2020.
- Ransomware usage increased 435% from the previous year.
- Remote work has increased the average cost of a data breach because remote workers do not have the same level of security at home.
- 43% of cyberattacks target small business.
Each business should ask themselves.
- What would it cost to remediate if the business data and client data on our computers were sold on the Dark Web?
- How much would it cost the business if we had no access to our computer systems for one hour, one day, one week, and one month?
- How much would we save on our Cybersecurity Insurance if we implemented SOC Services?
Vintage Network Administrators can help businesses with these questions as well as documenting a disaster recovery plan
for emergency response. Network Admin services are free for our TruMethods clients.
What is Vintage’s SOC Offering?
Vintage’s SOC is powered by Kaseya’s RocketCyber Cloud Platform and provides 24 x 7 continuous monitoring, always on threat detection in real-time. The Vintage staff will be notified 7 x 24 of high-level security incidents where we will have the opportunity to attempt to disable destructive payloads before the payload is activated by the bad actors. The Vintage offering includes:
SIEMless Log Monitoring
We will monitor, search, and report the 3 attack pillars: Network, Cloud, and endpoint log data to include:
- Windows and macOS security events
- Firewall and Network device events
- Office 365 and Azure AD cloud events
Threat Intelligence and Hunting
Our real-time threat intelligence monitoring is connected to premium intel feed partners giving our customers the largest global repository of threat indicators. Our SOC Analysts utilize intel telemetry to hunt bad actors.
Breach Detection
The SOC offering will allow us to detect adversaries that evade traditional cyber defenses such as Firewalls and AV. We can identify many patterns of activities or methods associated with a specific threat actor or a group of threat actors which will produce a forensic timeline of chronological events to deter many intruders before a breach occurs.
Intrusion Monitoring
Real-time monitoring of malicious and suspicious activity and identifying indicators such as:
- Connections to terrorist nations
- Unauthorized network connections
- Backdoor connections to servers controlled by a cybercriminal
NextGen Malware
No single AV is perfect. An additional layer is provided.
PSA Ticketing
The SOC Analyst investigate each alert, triage the data, and then produce a ticket in the Vintage ticketing system when further actions is needed.
What is SOC Services going to cost us?
$15 / month for each server and each end-user computer. A company with 2 servers and 20 desktops/laps will pay an additional $330 per month.
Why are you forcing me to have SOC Services? Why can’t I make my own determination?
We feel many small business executives do not understand the risk to their business. If we have not done a good job explaining in this
document, we are willing to spend more time with you to help you understand. One way we can get your attention is requiring SOC
Services. It demonstrates our seriousness about the risks.
Especially in this day of Compliance and government regulations, Managed Services Providers, have risks and liabilities and responsibilities. The cost of our labor after a Cyberattack can be very expensive.
If after talking in detail with us about your risks, you still feel you are willing to allow your business to have unnecessary exposure to Cyberattacks, we will allow you to opt out by signing a legal agreement where you acknowledge the risks and take all legal and fiduciary responsibilities for any breaches.