Security Operations Center

Header image overlay

Security Operations Center (SOC)

24/7 Detection & handling of Cybersecurity alerts

Cyber attacks are becoming more frequent & complex. For a fixed monthly fee, VanRoey detects all malware & suspicious activity in your environment. Our cybersecurity experts will process all security alerts, 24/7!

How our Security Operations Center protects your environment up to the maximum

Important: Alerts & logs contain highly sensitive information. We handle this 100% indoors!
Our SOC is built for Microsoft 365 environments with SentinelOne (EDR) and Fortigate firewalls. VanRoey has Level3 specialists who handle these alerts themselves 24/7. Why is that important? Other SOCs often allow 'all brands', but send alerts & logs to external partners (e.g. US organizations) for analysis & handling.

How does the VanRoey SOC work?
For a predictable monthly fee, you'll work a lot safer!

Security Operations Centre (SOC) overview

Any device with a win/mac/linux operating system will be monitored through the AI EDR tool SentinelOne Complete . From IoT & servers to PCs ... All cybersecurity incidents surface as alerts and these are collected along with the logs.

Fortigates generate gigantic logs (DPI) with very sensitive info as well as alerts. These are also monitored and collected. Of course, all data stays indoors!

Whether it was done by a colleague or hacker; every suspicious move within your entire Microsoft 365 tenant is scrutinised.

Safe, suspicious and failed login attempts, movements of users trying to get into places they shouldn't be... Permissions shifting... Everything is logged and thoroughly monitored!

VanRoey AI-Powered Datalake

All logs from your endpoints, fortigates, Microsoft 365 environment and Identity movements are securely collected in our private datalake . Here it is continuously analysed by AI and all data and activity is subject to rules from the MITRE ATT&CK framework, complemented by our own smart rules that uncover (and block) suspicious movements.

VanRoey SOC Team

Our SOC Team consists of a number of unrivalled security experts who look after your alerts and analyse log files 24/7.

Our SOC team is not alone and can always call on their colleagues for the most challenging or specific alerts. Think of our VanRoey Level-3 specialists in servers, storage, networking, devices, virtualisation, OT-Security...

Top relationship with vendors

This enables us to call on direct support from suppliers/manufacturers to handle serious or unprecedented incidents quickly and effectively with additional advice from their specialists

Security Operations Centre (SOC) overview

All cybersecurity alerts and logs from your environment (endpoints, firewalls, your Microsoft 365 and identity movements) are collected in our VanRoey AI Datalake. Correlations between logs and alerts are made and smart rules bring up suspicious behaviour. Our certified experts will handle every alert 24/7. Of course, they can also call on hundreds of additional expert colleagues in their verticals, as well as vendors for direct support!

The result?

From now on, certified Fortinet NSE8 profiles, SentinelOne 'Paladins' and Microsoft Security specialists, all with years of experience, watch over your organisation 24/7. Backed by AI, smart rules and their fellow specialists at VanRoey!

VanRoey SOC
All your alerts are handled by VanRoey 24/7!

Unlike other Security Operation Centres, VanRoey does not share any logs or alerts with third parties. We have all the knowledge in-house.

Protected against zerodays & fileless malware

Logs contain millions of lines & contain a wealth of information. If e.g. legitimate software suddenly makes a move to your kernel, not only will it be blocked, but an alert immediately pops up which we judge.

Suspicious behaviour that is not 'malware' surfaces

Moves by hackers as well as rogue colleagues come to light. The MITRE ATT&CK® framework provides numerous rules that expose and block suspicious behaviour and typical hacking attempts. We complement this with hundreds of our own rules.

Thoroughly forensic investigation

Where did a hack (attempt) come from? What data was accessed? Logs know no secrets! But we go even further: Was data leaked after a hack and offered for sale on the darkweb? Our experts will find out!

Peace of mind invaluable for the whole organisation!

Your IT team can focus on its core tasks and let go of this incredibly complex matter. A hacking attempt at 3am on Christmas Eve? VanRoey solves it!

VanRoey SOC
Questions and/or a price estimate?

Let us know approximately how many PCs, (virtual) servers you have and whether you use Entra ID or on-premises AD. We will then email you a price estimate per month! (No need to count Firewalls & MS365 licences)

VAT no.

An SOC with direct support from manufacturers?
Thanks to our maximum partnerships can do it!

Receive our newsletter including invitations to events & interesting industry news!

During this inspiring morning, discover how we protect your organisation 24/7 thanks to our brand new Security Operations Center!