Your guide to inSOC’s services
Welcome to inSOC
This playbook gives an overview of the services we offer, and provides useful downloads with more detailed information, plus a selection of editable templates for use during the sales process.
A list of our most frequently asked questions.
A list of compatible APIs with downloadable setup instructions and onboarding process.
Azure Active Directory
AWS Cloud Trail
Azure Office 363
Sophos Central Access
VS Install Process - Linux
VS Install Process - OVA
Configuring Duo Security Connectors
Onboarding Process Overview
An editable elevator pitch with suggested messaging to use during the sales process.
An introduction to inSOC’s services, covering who we are, what we do, and how we help you as an MSP to offer cybersecurity services to your customers.
White Label Sales Deck
An editable sales deck for you to supply to your prospects.
Compare the features of our One Stop SOC packages: Essential, Power and Premium.
| Essential ||Power||Premium|
|Next Gen SIEM hardware appliance for network monitoring|
|Additional site -Next Gen SIEM hardware appliance for network monitoring (75 IPs)||Optional|
|1U 200 IP appliance upgrade||Optional|
|Additional 25 IP block||Optional|
|Agent-based Next Gen SIEM for log monitoring|
|Next Gen Cloud SIEM (M365/Gsuite/AWS/Azure Active Directory)|
|Windows & Linux agents|
|Network deep packet inspection|
|Scheduled weekly vulnerability scanning|
|Weekly vulnerability reporting|
|(PCI, GDPR, HIPAA, DFARS)|
|24x7x365 SOC threat, event and incident alerting|
|24x7x365 SOC analysis and recommendations|
|CIS Top 20 Critical Security Controls SOC reports|
|Standard onboarding to the appropriate CIS Top 20 Critical Security Controls|
|Onboarding (additional site)||Optional|
|Post incident investigation with CISSP resource||Hourly Rate|
An outline of the technical and professional ability of inSOC personnel.
|Personnel||Number available||Certifications/qualifications at each level|
|Security Operations Center Technicians||21||BSC Computer Science, BSC Cybersecurity, MSc Network and Information Security, Certified Security Operation Center Practitioners, Google IT Support Certification, Certified Professional Forensics Analysts, AWS Security Fundamentals Certification, Microsoft Certifications|
|Security Engineers for escalation of high priority incidents||10||(Additional to the above) CISSP, CCIE, CISA, CISM, , ISO/IEC 27001 Information Security Associate, Foundations of operationalizing MITRE ATT&CK, Information Security Incident Handling Certification, Microsoft Certifications: Azure Administrator Associate, Certified Ethical Hackers, Fortinet's Network Secuirty Expert Certification NSE 1, Fortinet's Network Secuirty Expert Certification NSE 2|
|Security Operations Center Manager||"*1 SOC Manager per Shift *1 SOC Director *Overseen by CTO"||(Additional to the above) CISSP, management experience of 5+ years|
|*Multiple individuals hold each certification|
|*High priority incidents are identified by the AI within the SIEM tool, registered by the SOC analysts and escalated immediately to the Tier 3 team for analysis.|
|*SOC management are required to have 5+ years management experience in large teams plus experience within and level 3 network engineering role in order to have the highest understanding of the issue and required actions.|
An overview of inSOC’s onboarding process.
We set up a physical or virtual appliance at each of your subscribing customers' sites.
Fire up the software
You are now ready to start onboarding your first customers.
Start onboarding your customers
Our CISSP-led onboarding team will help you to harden your customers' environments, mapping to the appropriate CIS Critical Security Controls.
Once onboarded, we begin to collect critical security logs, perform deep packet inspection and conduct scheduled weekly vulnerability scanning.
Download a detailed version of inSOC’s onboarding process below.
Statement of Work (SOW)
Download our Statement of Work for One Stop SOC services.
Responsible Accountable Consulted Informed (RACI)
Download our RACI chart, plus a tuning checklist detailing the onboarding process, and critical controls alerts list.
inSOC has attained the ISO 9002: 2015 certification
(reg. number 21002).
(reg. number 21002).
Threat Assessment Reporting
inSOC supplies you with unique and comprehensive threat assessment and security risk reporting that goes beyond what other vendors offer. We provide a visual overview for the C-level team, detailed recommendations for technical staff, and step by step instructions based on critical risks, all based on the NIST Cybersecurity Framework and mapped to the relevant CIS Critical Securtity Controls.
Download sample reports below.
MSP Select has been designed to enable our key MSP partners to grow cybersecurity sales through a personalized sales and marketing program delivered by our experts. It offers one-to-one sales support and coaching, a full suite of marketing collateral – from a brand new website to managed campaigns and collaborative webinars – and social media management. If you’re an inSOC partner looking to rapidly grow your cybersecurity sales, MSP Select is the program you need to reach the next stage of growth. To qualify for the Select program you will need to have MSP Protect in place and meet the minimum monthly revenue requirement.
Glossary of SOCaaS terms
- Asset: Any hardware, software, data, or personnel that has value to an organization.
- Authentication: The process of verifying the identity of a user or device attempting to access a system or application.
- Active Directory: A directory service developed by Microsoft that stores information about objects on a network, such as users, computers, and groups.
- Advanced Persistent Threat (APT): A targeted and persistent attack against a specific organization or individual, often carried out by skilled and determined threat actors.
- Network Security: The practice of protecting computer networks from unauthorized access or attack.
- Next-Generation Firewall (NGFW): A firewall that uses advanced techniques such as deep packet inspection and application-level filtering to improve network security.