Security Operations Center

24/7 monitoring with SOC as a Service

How strong is your cyberdefense?

Cyber attacks on companies and organizations happen around the clock. The consequences range from business interruption and loss of reputation to insolvency. This is why your IT systems must be monitored 24/7, 365 days a year, so that you can act quickly in an emergency.

You need to master these factors so that you can recognize and combat external attacks:

  1. Understanding the cyber attackers’ approach (read more about the Cyber Kill Chain)
  2. Know the normal state of your IT systems to identify deviations
  3. Prepare a multi-layered cyber defense to quickly initiate countermeasures.

An external Security Operations Center with automated cyber forensics enables you to overcome this challenge – individually tailored to your needs and scalable so that cyber defence can grow with your company. And all this at predictable, transparent costs that suit your company.

You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.

More Information

Your advantages with agilimo's external SOC

As a Managed Security Service Provider (MSSP) , agilimo Consulting offers outsourced monitoring and management of security devices and systems for companies and organizations.

Our high-availability Security Operations Center, located in Germany, provides tailored services for your company around the clock as an external security center:

  1. Individual monitoring of your IT systems 24/7, 365 days a year

  2. SOC located in Germany

  3. Adapted Monitoring processes specifically tailored to the customer situation

  4. Automated cyber forensics

  5. Threat detection as quickly as possible

  6. Remaining capable of acting and react quickly in an emergency

  7. Scalable monitoring through SOC aaS

  8. Predictable, transparent costs per monitored IP

Who can benefit form a Security Operations Center?

  • Companies that must comply with the NIS2 regulations

  • Companies that must comply with KRITIS regulations

  • All organizations that want to protect themselves effectively against cyberattacks

  • All companies/organizations that want to monitor their systems 24/7

  • All companies/organizations that do not want to rely solely on a virus scanner

SOCaaS - Managed Security Module from agilimo for companies

With its scalable service modules, the Security Operations Center from agilimo Consulting supports companies and organizations in their cyber defence.

SOC
Essential

NIS2/BSI-compliant light

Creates a verifiable basic security level in accordance with BSI/NIS2 with automated alarms and IP monitoring.

Perfect for SMEs that want to implement their first regulatory steps.

Fast, cost-efficient protection without high complexity.

  • EDR-only monitoring
  • Dahsboard with the alerts and monitoring by SOC only outside the customer’s business hours (*)
  • Ticket generation for verified incidents (high and critical)
  • Up to 30 days data storage (can be extended to 180 days)
  • 1x service report with examples of recognized events per quarter
  • Darknet-Scan Essentials + 1 Initial Premium Darkscan
  • E-mail distribution list as contact person
  • Low barrier to entry, transparent cost structure
  • Fast integration & basic protection
  • Ideal for start-ups and small companies

Price / year

per client:
from 38,40€
per server:
from 91,20€

SOC
Standard

for ISMS or ISO objectives

Meets key requirements from BSI 200-x and NIS2: proactive alerting, log file evaluation, OSINT monitoring and compliance-compliant review processes.

Medium-sized companies with increased protection requirements.

Structured threat detection with proactive security.

  • All services from Essential
  • EDR and XDR monitoring
  • 24 /7 Monitoring by SOC
  • Up to 180 days of data storage
  • Monthly reports & review meetings
  • E-mail distribution list
  • Log file analysis + Log Collector installation
  • Development and use of dedicated detection rules
  • Asgard Agent – Incedent Response light
  • Connection of common systems (Office 365, AD, FW via syslog)
  • Technical principles for compliance with ISO27001/BSI are supported
  • Significantly improved response & early detection
  • Stronger compliance foundation
  • Customized rules for your company

Price / year

per client:
from 57,60€
per server:
from 158,40€

SOC
Premium

Fully regulatory oriented

Complies with NIS2, BSI basic protection and ISO27001, incl. audit reports, SLA-controlled incident processing, threat intelligence, 24/7 incident response, SIEM integration.

For organizations with the highest requirements & compliance obligations.

Maximum security, transparency and speed of response.

  • All services from Standard
  • Development of custom integrations
  • Additional reports on request + monthly strategy meeting
  • SLA: 15-30 minutes response time for critical incidents
  • Availability by telephone
  • Proactive threat hunting & threat intelligence feeds
  • Full integration & operation of SIEM/SOAR systems
  • Customer dashboard with live data
  • Extended compliance reporting (ISO 27001/BSI)
  • Premium Darkscan
  • Incient Response (realized via the partner)
  • Comprehensive protection & continuous optimization
  • Exclusive SOC support with senior expertise
  • Ideal for regulated industries (finance, healthcare, etc.)

Strategic partnership with Nextron Systems

As the operator of a German security operations center, agilimo relies on products from the German security specialist Nextron Systems. agilimo uses Nextron’s Thor and Aurora products to optimally monitor and protect customer systems. The products enable fast and customized analysis automation for threat situations through specific, customized protection rules.

Technical task sharing of the Nextron products Thor and Aurora

  • Thor is an APT scanner for automated forensic scans; APT refers to so-called Advanced Persistent Threats.
  • Aurora is used in the agilimo SOC as an extended virus scanner for Windows systems for Endpoint Detection Response (EDR).