Managed CybersecurityServices That Actually Defend You
Petronella Technology Group operates a 24/7 managed SOC, modern EDR and XDR, a tuned SIEM, tested incident response, and the vulnerability and patch discipline that closes the doors attackers walk through. One team, one monthly fee, measurable outcomes.
Why Is Endpoint Antivirus Not Enough Anymore?
We meet with owners and executives every week who believe their business is protected because endpoint antivirus renewed last quarter and nothing has obviously caught fire. The reality is different. Ransomware no longer looks like the malware of 2015. Credential theft, business email compromise, and hands-on-keyboard intrusions rarely trigger a signature. The attacker spends two to six weeks inside the environment before anyone notices, and the first signal is usually a ransom note or a wire transfer that already cleared.
A real cybersecurity program is a layered, operational discipline. It runs twenty-four hours a day, it assumes the attacker is already on the network, and it measures success in mean time to detect and mean time to contain, not in annual audit box-checking. We built our managed cybersecurity service to deliver exactly that kind of program to small and mid-size businesses that cannot justify building an internal security operations center of their own.
Our engagement replaces the patchwork of a standalone antivirus, a forgotten firewall, a dormant MFA rollout, and a backup you have never tested. One vendor, one contract, one team that owns the outcome. If something goes wrong we answer the phone, we open the ticket, and we run the response; you do not get handed between four product vendors trying to figure out which logo is responsible.
What Is Included In A Managed Cybersecurity Service?
Every layer of the defense model, operated by our managed SOC team on your behalf.
24/7 Managed SOC
Human analysts on watch around the clock. Every alert reviewed by an engineer, not routed into a queue nobody reads. Average triage time in minutes, not hours. Escalation directly to your on-call contact when something requires a decision.
EDR and XDR
Modern endpoint detection on every workstation, server, laptop, and server workload. Behavioral analytics catch fileless attacks that signatures miss. XDR correlation across endpoint, identity, email, and cloud surfaces gives us one timeline per incident instead of five disconnected alerts.
SIEM and Log Management
Centralized log collection across your endpoints, servers, firewalls, identity providers, and cloud tenants. Correlation rules tuned for your environment. Long-term retention that satisfies HIPAA, PCI DSS, and CMMC audit requirements.
Incident Response
Written runbooks, practiced muscle memory, and the authority to contain an incident the moment it is detected. Every client has a declared incident response plan with named roles, clear escalation, and a fixed response SLA. We run tabletop exercises once a year so the plan is not the first time you use it.
Vulnerability Management
Continuous external and authenticated internal scanning. Findings prioritized by real exploitability, not CVSS theater. Remediation tickets issued to the team that owns the asset with target dates that match severity. Monthly reports show you the trend.
Patch Management
Operating systems, applications, firmware, and third-party software kept current on a predictable cadence. Emergency out-of-band patches deployed within hours for active exploitation. Full audit trail for compliance review. See our managed IT services for the infrastructure layer.
Identity and Access
Multi-factor enforcement on every account, phishing-resistant where possible, and quarterly access reviews. Privileged access tightly controlled. Conditional access policies that prevent risky sign-ins before they complete. Break-glass accounts documented and monitored.
Email and Phishing Defense
Advanced email filtering tuned to your mail flow, attachment detonation, link rewrite and re-check at click time, and user reporting integrated directly into our SOC queue. Every reported phish is reviewed by an engineer within minutes.
User Education
Monthly phishing simulations sized to your environment, short-form training when a user clicks, and role-specific modules for finance, HR, and executive teams. We measure click rate and report rate over time. Security awareness as a program, not a compliance checkbox.
Backup and Recovery
Immutable backups, cross-region replication, ransomware-resistant storage, and quarterly restore testing. Recovery time objectives defined for every tier of data. Backups you have actually tested, because a backup that has never been restored is a wish.
Security Engineering
When the environment needs a control we don't yet have, our engineers build it. Conditional access policies, new SIEM rules, custom detection content, hardening guides for specific applications. Included in the monthly engagement, no change orders for routine work.
Reporting and Board Packets
Monthly operational report for the security team. Quarterly executive summary for leadership. Annual board packet with trend data, incident history, and coverage against your chosen framework. You always know what the program is actually doing.
How Does A 24/7 Managed SOC Actually Work?
Most managed security services fail in one of three places: the alert never reaches a human, the human who receives it does not have the context to act, or the response takes so long the damage is already done. We built our SOC stack to close all three gaps at once.
Detection
Telemetry from every layer of your environment flows into our detection platform in near real time. That includes endpoint detection agents, identity provider sign-in logs, email security events, cloud audit logs, firewall and network events, and any application-specific logs we onboard during the engagement. Correlation rules written specifically for your environment fire on patterns that indicate real adversary activity, not the generic alert noise you would get out of the box.
Triage
Every alert that matches a real detection is reviewed by a human analyst. We enrich each alert with user context, asset context, recent change history, and threat intelligence before we decide what it is. Most noise is closed at triage. Real signals escalate to an engineer within minutes, with a full timeline attached so the responder does not start from zero.
Response
For declared incidents the response team has the authority to isolate endpoints, disable compromised identities, revoke active sessions, block malicious domains at the perimeter, and kick off backup preparation. We do not wait for a written approval from an executive at three in the morning; we act on pre-authorized playbooks, then brief you on what happened and why. Full post-incident report within five business days with root cause, timeline, and specific hardening recommendations.
Hunt
Detection rules only catch what you know to look for. Our team runs structured threat hunts against your data every month to surface the things detection missed. Hunt results feed back into the detection rule set, which means the program gets smarter about your environment every quarter.
How We Get You Operational
Security posture assessment and gap analysis
EDR deployment across endpoints and servers
Log source integration into SIEM
Identity hardening and MFA enforcement
Detection rules tuned to your environment
Incident response plan documented and walked through
User education program rollout
Tabletop exercise to verify readiness
Operational handoff with monthly reporting cadence
What Service Level Agreements (SLAs) Come With Managed Cybersecurity?
We publish the SLAs in the contract because outcomes matter more than promises. For our managed cybersecurity clients:
- Critical security alerts: engineer on the alert within fifteen minutes, any hour of the day.
- High-severity alerts: engineer on the alert within one hour.
- Declared incident response: containment actions initiated within thirty minutes of declaration.
- Patch deployment: critical patches within seventy-two hours of vendor release, emergency out-of-band within twenty-four hours when active exploitation is confirmed.
- Phishing report triage: within fifteen minutes during business hours, within one hour after hours.
- Operational reporting: monthly report delivered by the fifth business day of the following month.
- Quarterly executive review: scheduled within ten business days of quarter close.
If we miss an SLA we tell you; we do not wait for you to discover it. Service credits are defined in the contract. Transparent reporting on every SLA, every month, since day one.
Framework-Mapped From Day One
Our managed cybersecurity service is built against the control sets your auditors actually reference. That means the evidence for your SOC 2, HIPAA, PCI DSS, or CMMC audit is produced as a byproduct of running the program, not something we assemble the week before the auditor arrives.
Coverage includes:
- SOC 2 Type II: Common Criteria controls for security, availability, and confidentiality, with a pre-built evidence package updated quarterly.
- HIPAA Security Rule: administrative, physical, and technical safeguards mapped to our service components, including audit trail and access review evidence.
- PCI DSS 4.0: Requirements 1 through 12 coverage for the in-scope cardholder data environment, with quarterly scan and segmentation testing support.
- CMMC Levels 1 through 3: control implementation aligned with the NIST 800-171 and 800-172 baselines, covered by our RPO #1449 practice lead.
- NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, Recover mapped to every service component for organizations that use NIST CSF as their primary governance framework.
If your framework is not on this list we still cover you; the control mapping is how we structure the service, and we can translate it to any reasonable reference model.
AI Paired With Human Experts
We use AI to make our human analysts faster, not to replace them. Our detection pipeline uses modern analytics to cluster related events, score suspicious behaviors, and prioritize the queue. Our intake bots enrich each alert with context before a human ever opens it. And our internal tooling drafts incident reports that an engineer reviews and signs off on rather than writing from a blank page.
What we do not do is auto-remediate based on a probability score. Every consequential action in your environment is reviewed by an engineer. AI is in the tooling, not in the decision chair. For clients who want to go further, our private AI cluster supports on-premise inference with zero data leaving your boundary, which some regulated clients use to power their own internal copilots without exposure to public AI services.
Built For
Frequently Asked Questions
Do I keep my existing security tools or switch to yours?
Whichever approach produces the best outcome. If you have a tool that works and is current, we often integrate with it and add our operations on top. If the tool is end-of-life, poorly tuned, or contributing to alert fatigue, we help you migrate to a better fit during onboarding. We do not force a rip-and-replace for its own sake.
How do you handle the transition from our current provider?
A documented runbook with no coverage gap. We run in parallel with the outgoing provider for thirty to sixty days, absorb their alerts and runbooks, validate our telemetry coverage, then cut over once you are comfortable. At no point is your environment unmonitored.
Is this a good fit for a company that already has an internal security team?
Yes. About half our engagements are hybrid: the internal team owns strategy, engineering, and business-hours operations; we run the 24/7 watch, weekend and holiday coverage, and the incident response backbone. Your team stops carrying a pager.
What happens when an incident is declared?
We reach your designated on-call contact within fifteen minutes by phone, text, and email. Pre-authorized containment actions begin immediately per the runbook. A dedicated incident channel opens in your preferred communication platform. We run the response from declaration through containment, eradication, recovery, and post-incident review. Full written report within five business days.
Do you carry cyber insurance requirements in your configuration?
Yes. Most cyber insurance carriers now require MFA everywhere, EDR, immutable backups, and an incident response retainer. Our base engagement covers every common underwriting requirement we see, and we produce the attestation letters your broker needs.
How does this compare to buying antivirus and a SIEM separately?
The tools are the cheap part. Operating them well is the expensive part. A typical internal SOC with proper coverage costs between eight hundred thousand and a million five per year in fully loaded staff, tools, and training. Our managed service delivers equivalent outcomes for a fraction of that cost by spreading the SOC team across multiple clients. See our cybersecurity overview.
Can you also run my executive and board protection?
Yes. We run a separate VIP security practice at our VIP security page for high-net-worth executives, law firm partners, and family offices. It stacks with the business engagement and covers personal devices, personal email and cloud, and family-member accounts.
Do you operate only inside the United States?
Our engineers and SOC analysts are based in the United States. For clients with strict data-residency requirements (defense, healthcare, some financial) we can guarantee US-only operations and US-only data storage in writing.
The Threats We Actually See
The threat landscape discussion in most sales decks is abstract. Ours is not. Every week our incident response team handles real intrusions at real clients and prospective clients in the Triangle and across the Southeast. What follows is the current shape of the attacks we see, shaped into rough categories.
Ransomware evolving into data-extortion
Traditional ransomware (encrypt the files, demand a ransom) has largely been displaced by data-extortion variants where the attacker exfiltrates sensitive data first and then encrypts as a secondary pressure point. The ransom becomes a ransom plus a data-breach payment, frequently multiplying the financial exposure by three to ten times. Our playbook assumes both motions are running and structures detection and response around stopping exfiltration as early as possible, not just preventing the encryption step.
Business email compromise
BEC is still the single most consistent loss vector for small and mid-size businesses. The attacker compromises an executive mailbox via credential theft, studies the communication patterns for weeks, then intercepts or initiates a wire transfer request at exactly the right moment to a newly-registered domain that mimics a legitimate vendor. Prevention is identity hardening plus out-of-band verification for high-value transactions; detection is mailbox rule monitoring, sign-in anomaly correlation, and fast triage of reported phishes.
Hands-on-keyboard intrusions
Once an attacker has a foothold, the dwell time before detection frequently stretches weeks. They probe, they escalate, they establish persistence, they quietly exfiltrate. Standard endpoint antivirus does not see this because the attacker is not running malware in the traditional sense; they are using legitimate Windows and Linux tools against the defender. We detect this by correlating identity activity, process behavior, and network movement, which is why endpoint-only products consistently miss it.
Supply chain compromise
A vendor you trust gets compromised, and the access they have to your environment becomes the attacker's access to your environment. Seen frequently through managed service provider credentials, SaaS integration tokens, and supply-chain software updates. Defense is scoping vendor access to least privilege, monitoring vendor account activity as carefully as employee activity, and treating any anomaly in vendor behavior as a potential upstream breach.
Insider threat
Less dramatic but consistent. A departing employee exporting customer data, an admin installing a personal remote-access tool, a contractor keeping VPN credentials after the engagement ends. Insider threat detection does not require elaborate tooling; it requires access reviews, DLP on sensitive repositories, and detection rules that flag data access patterns inconsistent with normal behavior.
How We Prove The Program Is Working
A security program that cannot prove its value gets cut the first time the budget tightens. Our managed cybersecurity service is built around a small set of measurable outcomes we report on monthly so you always have the data to defend the program and to identify where to invest next.
Mean time to detect
The time between an attacker performing an action in your environment and our SOC creating an investigation for it. We track this per detection class (identity, endpoint, email, cloud, network) and trend it quarter over quarter. Our goal is minutes, not hours, for every class that matters.
Mean time to contain
The time between investigation creation and the moment containment actions are in place (endpoint isolated, account disabled, session revoked, domain blocked). Measured per incident class. Published in the monthly report.
Detection coverage
Percentage of MITRE ATT&CK techniques covered by our detection rules in your environment. New techniques are added continuously as threat intelligence matures. Coverage gaps are visible so you know where the weakness is, not hidden behind a marketing number.
Patch velocity
Time between vendor patch release and deployment to your production fleet, by severity. Critical, high, medium, and low tracked separately. Target thresholds published in the contract.
Phishing resilience
Click rate, report rate, and credential-entry rate against our monthly simulation campaigns. Click rate trends downward with training; report rate trends upward. The gap between them is the measurable effect of the awareness program.
Identity hygiene
MFA coverage percentage, stale account count, privileged account count, service account audit status, break-glass account health. Reported monthly so drift is visible before it becomes a finding on an audit report.
Incident volume and trend
Incidents by class, by severity, by mean-time-to-resolve, and trended over time. An informed trend line is worth more than any individual number; it tells you whether the attacker volume is growing faster than your defense is maturing.
Talk To A Security Engineer, Not A Sales Rep
Free posture assessment. Thirty minutes, one of our engineers, straight answers on where you stand and what meaningful protection would cost.
Why Petronella Runs This Program Differently
Most managed security service providers you will evaluate fall into one of two buckets. Large national providers that have the scale but not the local presence, and regional shops that have the presence but not the depth on modern threats. Petronella Technology Group sits in the narrow middle: regional enough to pick up the phone when you call, deep enough to run a real security operations program, and independent of the product vendors whose tools we deploy.
Our founder Craig Petronella holds CMMC-RP, CCNA, CWNE, and Digital Forensics Examiner #604180 credentials. Our practice is a CMMC-AB Registered Provider Organization (RPO #1449). The entire engineering team holds CMMC-RP. We have been operating in the Triangle for more than two decades with a BBB A+ rating since 2003. Those are not marketing badges; they are the reason auditors and regulators take our reports seriously and the reason we can represent your security program in front of a CMMC assessor or a cyber insurance underwriter with authority.
What sets our engagements apart operationally is accountability. Every client has a named engineer who owns their program. Every incident has a named owner through closure. Every SLA has a measurable target and a published actual. When something goes wrong we tell you before you find out, and we tell you what we are going to do about it. That is the difference between a vendor and a partner, and it is the difference our clients name most often when they explain why they stayed with us for a decade.
Part of our full cybersecurity program.
Executive and board-level coverage: VIP security.
On-premise inference for regulated data: private AI cluster.
Start with a vulnerability assessment or cloud security review.