VanRoey » Security Operations Center
Security Operations Center (SOC)
24/7 Detection & handling of Cybersecurity alerts
Cyber attacks are becoming more frequent & complex. For a fixed monthly fee, VanRoey detects all malware & suspicious activity in your environment. Our cybersecurity experts will process all security alerts, 24/7!
- Maximum certified experts analyse both Security alerts & logs
- Our Eyes Only: VanRoey experts handle everything, without third parties
- Maximum detection, also from zerodays, thanks to AI and smart rules
- Thorough analysis and careful assessment of each alert
How our Security Operations Center protects your environment up to the maximum
Important: Alerts & logs contain highly sensitive information. We handle this 100% indoors!
Our SOC is built for Microsoft 365 environments with SentinelOne (EDR) and Fortigate firewalls. VanRoey has Level3 specialists who handle these alerts themselves 24/7. Why is that important? Other SOCs often allow 'all brands', but send alerts & logs to external partners (e.g. US organizations) for analysis & handling.
How does the VanRoey SOC work?
For a predictable monthly fee, you'll work a lot safer!
Any device with a win/mac/linux operating system will be monitored through the AI EDR tool SentinelOne Complete . From IoT & servers to PCs ... All cybersecurity incidents surface as alerts and these are collected along with the logs.
Fortigates generate gigantic logs (DPI) with very sensitive info as well as alerts. These are also monitored and collected. Of course, all data stays indoors!
Whether it was done by a colleague or hacker; every suspicious move within your entire Microsoft 365 tenant is scrutinised.
Safe, suspicious and failed login attempts, movements of users trying to get into places they shouldn't be... Permissions shifting... Everything is logged and thoroughly monitored!
VanRoey AI-Powered Datalake
All logs from your endpoints, fortigates, Microsoft 365 environment and Identity movements are securely collected in our private datalake . Here it is continuously analysed by AI and all data and activity is subject to rules from the MITRE ATT&CK framework, complemented by our own smart rules that uncover (and block) suspicious movements.
VanRoey SOC Team
Our SOC Team consists of a number of unrivalled security experts who look after your alerts and analyse log files 24/7.
Our SOC team is not alone and can always call on their colleagues for the most challenging or specific alerts. Think of our VanRoey Level-3 specialists in servers, storage, networking, devices, virtualisation, OT-Security...
Top relationship with vendors
This enables us to call on direct support from suppliers/manufacturers to handle serious or unprecedented incidents quickly and effectively with additional advice from their specialists
All cybersecurity alerts and logs from your environment (endpoints, firewalls, your Microsoft 365 and identity movements) are collected in our VanRoey AI Datalake. Correlations between logs and alerts are made and smart rules bring up suspicious behaviour. Our certified experts will handle every alert 24/7. Of course, they can also call on hundreds of additional expert colleagues in their verticals, as well as vendors for direct support!
The result?
From now on, certified Fortinet NSE8 profiles, SentinelOne 'Paladins' and Microsoft Security specialists, all with years of experience, watch over your organisation 24/7. Backed by AI, smart rules and their fellow specialists at VanRoey!
VanRoey SOCAll your alerts are handled by VanRoey 24/7!
Unlike other Security Operation Centres, VanRoey does not share any logs or alerts with third parties. We have all the knowledge in-house.
Protected against zerodays & fileless malware
Logs contain millions of lines & contain a wealth of information. If e.g. legitimate software suddenly makes a move to your kernel, not only will it be blocked, but an alert immediately pops up which we judge.
Suspicious behaviour that is not 'malware' surfaces
Moves by hackers as well as rogue colleagues come to light. The MITRE ATT&CK® framework provides numerous rules that expose and block suspicious behaviour and typical hacking attempts. We complement this with hundreds of our own rules.
Thoroughly forensic investigation
Where did a hack (attempt) come from? What data was accessed? Logs know no secrets! But we go even further: Was data leaked after a hack and offered for sale on the darkweb? Our experts will find out!
Peace of mind invaluable for the whole organisation!
Your IT team can focus on its core tasks and let go of this incredibly complex matter. A hacking attempt at 3am on Christmas Eve? VanRoey solves it!
VanRoey SOC Questions and/or a price estimate?
Let us know approximately how many PCs, (virtual) servers you have and whether you use Entra ID or on-premises AD. We will then email you a price estimate per month! (No need to count Firewalls & MS365 licences)
VAT no.
An SOC with direct support from manufacturers? Thanks to our maximum partnerships can do it!
VanRoey chooses her partnerships carefully. To ensure optimal operation of our Security Operations Centre, we have the highest possible certification (Fortinet NSE 8, SentinelOne Paladin) and a perfect relationship with the necessary partners.
This allows us to support you from A to Z from our own in-house expertise, complemented by a direct escalation line with the manufacturers.
What do these partnerships mean to you?
Expertise and certification We have proven expertise in designing, implementing and supporting the solutions. | Access to resources VanRoey often gets access to exclusive training programmes and documentation materials | Technical support from the manufacturer to support you even better | Special pricing/discounts Thanks to large volumes and 'commitment' to partner | Reliability for you A recognised partnership proves our quality and reliability in delivering network solutions. It is a long-term relationship. |
|---|
VanRoey.be has been a top level partner of Fortinet from the very beginning! Fortinet Expert Partner
- Integrator
- Datacenter Specialization
We received this recognition because of our strong growth, commitment to network security and maximum certification (NSE8) within the Fortinet partner programme.
- Today, VanRoey is one of the only players in Europe to have multiple, maximally certified NSE8 profiles.
- Already 3 times in a row trusts SMALL awarded us the framework contract for Fortinet cybersecurity at government agencies!
SentinelOne is a US cybersecurity company that bets very heavily on a.i.-powered XDR for endpoint and server security. They also offer Identity Protection to very accurately protect your Active Directory setup, among other things. We offer their solutions, but also as a Managed Service (MDR), where we monitoring all your complex alerts.
You XDR solution from SentinelOne, powered by advanced AI technologies, provides superior threat detection, including advanced and emerging forms of malware and cyber-attacks. The fully automated system can not only detect threats, but also react quickly and effectively to neutralise them, reducing the need for human intervention and speeding up response time to threats.
In addition, SentinelOne offers seamless integration with both PCs and servers, ensuring consistent and effective security regardless of the type of device used. The company's strong reputation in the industry and the trust it has won from many large organisations worldwide attest to the effectiveness of their solutions and their ability to meet the high demands of modern cybersecurity.
Read here Why you find SentinelOne as a leader in the Gartner quadrant.
Our many years of cooperation have earned us numerous awards, including 2x ‘Partner of the year’!
- Tier 1 Cloud Service Provider
- Advanced Service Delivery Partner(!)
Thanks to the Advanced Service Delivery Partnership, our specialists can immediately call on Microsoft Level 3 specialists for Office 365, Azure, Dynamics 365, Copilot... The Tier 1 CSP partnership enables us to provide licences ourselves for customers, who in turn can do it themselves via our unique portal!
- Event
- Event