Kaseya RocketCyber Managed SOC

Managed security operations center

Introducing RocketCyber Managed SOC

It all starts with the multi-tenant cloud architecture fueled with integrated threat intelligence, a built-in app store with purpose-built threat detection apps enabling MSPs to deliver 24/7 threat monitoring providing visibility across 3 attack pillars:

Endpoint

  • Windows & macOS event log monitoring, breach detection, malicious files and processes, threat hunting, intrusion detection, 3rd party NGAV integrations and more.

Network

  • Firewall and edge device log monitoring integrated with threat reputation, whois and DNS information.

Cloud

  • Microsoft 365 security event log monitoring, Azure AD monitoring, Microsoft 365 malicious logins, Secure Score.

Key SOC Features

Partner with RocketCyber to deliver managed security to your customers.

SIEMless Log Monitoring

  • Monitor, search, alert and report on the 3 attack pillars: network, cloud and endpoint log data spanning:
  • Windows & macOS security events
  • Firewall & network device events
  • Office 365 & Azure AD cloud events

Threat Intelligence & Hunting

  • Real-time threat intelligence monitoring, connecting to premium intel feed partners giving our customers the largest global repository of threat indicators.
  • Our SOC Analysts utilize intel telemetry to hunt bad actors.

Breach Detection

  • Detect adversaries that evade traditional cyber defenses such as Firewalls and AV. Identifies attacker TTPs and aligns with Mitre Att&ck, producing a forensic timeline of chronological events to deter the intruder before a breach occurs.

Intrusion Monitoring

  • Real-time monitoring of malicious and suspicious activity, identifying indicators such as:
  • connections to terrorist nations
  • unauthorized TCP/UDP services
  • backdoor connections to C2 servers

NextGen Malware

  • Use your own malware prevention or leverage our command and control app for Microsoft Defender backed up with a secondary line of defense using RocketCyber's malicious detection of files, tools, processes and more.

PSA Ticketing

  • Our SOC analysts investigate each alert, triaging the data and produce a ticket to your PSA system accompanied with the remedy details so you can focus on your operations without hiring security engineers.