SOC in a Box

10 articles tagged with “SOC in a Box”

Small Business Security Cyber Security Fundamentals SOC in a Box Development Diary SMB Security Phishing Risk Management Email Security Access Control Governance GDPR Cyber Threats UK Compliance Ransomware Managed SOC SOC Cyber Defence Board Reporting MFA Data Loss Prevention Data Protection Incident Response Data Breach Managed Security ICO Cyber Insurance Cyber Risk Cyber Essentials Getting Started Cyber Attacks Security Operations Cyber Security Podcast Threat Landscape Microsoft 365 Cloud Security Business Email Compromise BEC Fraud Financial Fraud OSINT Reconnaissance Attack Surface Social Engineering DLP Cyber Attack Crisis Management Insider Threats User Behaviour Multi-Factor Authentication Dark Web Threat Intelligence Cyber Security Policy Security Costs SOC as a Saving Supply Chain Security Third-Party Risk MDR Antivirus Threat Detection Cyber Security Basics Security Operations Centre Lessons Learned Deployment Onboarding Confidence Score Analyst Model Service Design DecoyPulse Deception Technology EmilyAI AI Security SOC365 Detection Engineering Hardware Product Design Security Checklist Risk Assessment Remote Working Hybrid Working VPN Security Awareness Staff Training Least Privilege User Management Physical Security Clean Desk Mobile Security BYOD MDM Web Security Safe Browsing DNS Filtering DMARC Network Security Wi-Fi Security Firewalls Patch Management Software Updates Vulnerabilities Backups Ransomware Recovery Business Continuity Passwords Password Manager Asset Management
Article 6 October 2025 9 min read

What We Learned Building SOC in a Box

Ten weeks of development diary concludes with the honest account: what we got right, what we got wrong, and what SOC in a Box looks like now it's live.

SOC in a Box Development Diary Lessons Learned
Read article
Article 29 September 2025 8 min read

Five Days: From Order to 24/7 Monitoring — How the Deployment Actually Works

Most SOC deployments take months. SOC in a Box takes five working days. Here's exactly what happens on each of those days — and why the timeline is achievable.

SOC in a Box Development Diary Deployment
Read article
Article 22 September 2025 6 min read

The Confidence Score: One Number That Tells Your Board How Protected You Are

Most security dashboards are built for security engineers. We built the Confidence Score for the people who actually have to make decisions — and answer to regulators.

SOC in a Box Development Diary Confidence Score
Read article
Article 15 September 2025 7 min read

Why Every SOC in a Box Client Gets a Named Analyst, Not a Ticket Queue

The security industry defaults to ticket queues. We decided every SOC in a Box client deserves a named analyst who knows their environment. Here's why that decision defines the product.

SOC in a Box Development Diary Analyst Model
Read article
Article 8 September 2025 6 min read

DecoyPulse: Deception Technology That Generates Zero False Positives

Honeypots and deception technology have been enterprise-only tools for too long. Here's how we built DecoyPulse into SOC in a Box — and why the logic is simple: if it touches a decoy, it shouldn't be there.

SOC in a Box Development Diary DecoyPulse
Read article
Article 1 September 2025 7 min read

EmilyAI: The Triage Layer That Keeps Human Analysts Focused on Real Threats

How our AI triage layer pre-processes and enriches alerts before they reach a human analyst — and why this matters more for small organisations than for large ones.

SOC in a Box Development Diary EmilyAI
Read article
Article 25 August 2025 7 min read

The Same Engine: Integrating SOC365 With a Compact Sensor

How we connected SOC in a Box to our full enterprise SOC365 platform — with zero compromise on detection quality. The architecture behind the identical capability claim.

SOC in a Box Development Diary SOC365
Read article
Article 18 August 2025 8 min read

Building the Box: Hardware Decisions for a Hardened SOC Appliance

What goes inside a SOC in a Box appliance? From form factor to encryption, here's every hardware decision we made — and why we made it.

SOC in a Box Development Diary Hardware
Read article
Article 11 August 2025 7 min read

The Idea: What If We Could Put a SOC in a Box?

Most product ideas come from a gap in the market. This one came from a pattern in incident response callouts. Here's how SOC in a Box went from concept to build.

SOC in a Box Development Diary Product Design
Read article
Article 4 August 2025 6 min read

Why Small Organisations Can't Get a Real SOC — And Why That's Wrong

The cybersecurity industry has spent years telling SMBs they don't qualify for a proper SOC. We decided to prove that wrong. Here's why we started building.

SOC in a Box SMB Security Development Diary
Read article