Security Operations Center (SOC) Services

What is Vintage doing to improve the security of my business?

By January 1, 2023, Vintage will require all clients to subscribe to the Vintage SOC Services offering. We have already begun to phase in these services for some clients. If you want to prioritize your business for SOC Services, please contact us. If we don’t hear from you, we will contact you in 2022 and notify you when we are implementing

What is SOC Services?

The function of the Security Operations Center (SOC) is to monitor, prevent, detect, investigate, and respond to cyber threats around the clock. A managed SOC offers external cybersecurity experts that monitor your logs, devices, cloud environments, and network for known and evolving advanced threats.

Why is SOC Services important to my business?

If bad actors can attack such companies as Microsoft, Twitter, Amazon, Netflix, GitHub, PayPal, Fox News, Zoom and National Governments, all organizations with multi-million dollar investments in information technology, what can bad actors do to your small business? According to IBM, it takes 280 days to find and contain the average cyberattack and the average cost is $3.86 million. The United States has the world’s highest data breach costs, with the average attack costing $8.6 million. More reasons:

Each business should ask themselves.

Vintage Network Administrators can help businesses with these questions as well as documenting a disaster recovery plan
for emergency response. Network Admin services are free for our TruMethods clients.

What is Vintage’s SOC Offering?

Vintage’s SOC is powered by Kaseya’s RocketCyber Cloud Platform and provides 24 x 7 continuous monitoring, always on threat detection in real-time. The Vintage staff will be notified 7 x 24 of high-level security incidents where we will have the opportunity to attempt to disable destructive payloads before the payload is activated by the bad actors. The Vintage offering includes:

SIEMless Log Monitoring

We will monitor, search, and report the 3 attack pillars: Network, Cloud, and endpoint log data to include:

Threat Intelligence and Hunting

Our real-time threat intelligence monitoring is connected to premium intel feed partners giving our customers the largest global repository of threat indicators. Our SOC Analysts utilize intel telemetry to hunt bad actors.

Breach Detection

The SOC offering will allow us to detect adversaries that evade traditional cyber defenses such as Firewalls and AV. We can identify many patterns of activities or methods associated with a specific threat actor or a group of threat actors which will produce a forensic timeline of chronological events to deter many intruders before a breach occurs.

Intrusion Monitoring

Real-time monitoring of malicious and suspicious activity and identifying indicators such as:

NextGen Malware

No single AV is perfect. An additional layer is provided.

PSA Ticketing

The SOC Analyst investigate each alert, triage the data, and then produce a ticket in the Vintage ticketing system when further actions is needed.

What is SOC Services going to cost us?

$15 / month for each server and each end-user computer. A company with 2 servers and 20 desktops/laps will pay an additional $330 per month.

soc services illustration

Why are you forcing me to have SOC Services? Why can’t I make my own determination?

We feel many small business executives do not understand the risk to their business. If we have not done a good job explaining in this
document, we are willing to spend more time with you to help you understand. One way we can get your attention is requiring SOC
Services. It demonstrates our seriousness about the risks.

Especially in this day of Compliance and government regulations, Managed Services Providers, have risks and liabilities and responsibilities. The cost of our labor after a Cyberattack can be very expensive.

If after talking in detail with us about your risks, you still feel you are willing to allow your business to have unnecessary exposure to Cyberattacks, we will allow you to opt out by signing a legal agreement where you acknowledge the risks and take all legal and fiduciary responsibilities for any breaches.


Contact Us Today!