SOC active · 24/7/365 · US-based

Managed Cybersecurity for U.S. SMBs — MDR, 24/7 SOC, SLA-backed compliance

Managed detection & response, 24/7 security operations center, compliance evidence collection, and on-site incident response for 1,200+ businesses across all 50 states. Since 1986.

15 min P1 response SLA 4 min mean time to detect 38,000 endpoints protected SOC 2 Type II ready

No credit card. Scan finishes in about 4 minutes. You get a 1-page report the same day.

0
Endpoints under management
across 1,200+ clients
0
Threats blocked last quarter
by our SOC
0
Ransomware attempts contained
in the last 12 months
24/7
US-based analyst coverage
Tampa · Orlando · Chicago
Service tiers

Three lanes. One contract. Pricing you can send to the CFO.

Every tier runs on the same stack and the same SOC. The difference is how much compliance work we take off your plate, and whether we show up on-site during an incident.

MDR Essentials
The baseline every business under 250 seats should have in 2026.
$18/endpoint/mo
Annual agreement · 50-endpoint minimum
  • SentinelOne Singularity Control EDR on every endpoint
  • 24/7 SOC monitoring with 15-min P1 response
  • Huntress-managed threat hunting on Windows + M365
  • Monthly executive report + quarterly posture review
  • KnowBe4 phishing training for all staff
  • Onboarding in 10 business days or credit your first month
Start Essentials →
MDR + IR Retainer
For firms where "everyone stopped working" costs $10k+ per hour.
Custom
Scoped by endpoint count & on-site radius
  • Everything in Compliance
  • 2-hour on-site IR anywhere in the continental US
  • Named IR lead with direct line (no ticket portal during a P1)
  • Annual tabletop exercise with your executive team
  • Dark-web credential monitoring for your domain + exec aliases
  • Quarterly external penetration test by a CREST-certified team
Scope IR Retainer →
The stack we actually run · no white-label mystery boxes
SentinelOne EDR Huntress MDR Microsoft Defender Cloud KnowBe4 SAT Cisco Umbrella DNS Arctic Wolf SOC partner Wasabi Immutable backup Tenable Nessus Vuln scan Duo MFA
SLA · in writing

The only response time that matters is the one signed into your contract.

Below is our standard SLA. Miss it and you get service credits, up to 100% of one month's fee. No "best effort," no "during business hours" weasel language.

Severity What it means First human response Containment target
P1 Active breach, ransomware, exec account takeover, payroll fraud in motion 15 min, 24/7/365 2 hours
P2 Confirmed malware on a single host, suspicious login from a new country, MFA push flood 1 hour, 24/7 4 hours
P3 Policy-violating behavior, failed login bursts, vuln scan findings to triage 4 hrs business / 8 hrs after-hours Same-day triage, remediation scheduled

Service credit schedule and a sample signed SLA PDF are available on request. Ask for a sample before you sign anything.

Case file · anonymized

One Sunday morning. One dental group. 34 minutes from detection to contained.

This is how an actual P1 ran for a 68-seat dental group in Miami last October. Names changed, timing and tooling real. This is what the retainer buys.

P1 · Ransomware · Resolved

"SilentGrove" dental group · 68 endpoints · Miami, FL

Sunday, 02:14 EDT · initial vector: compromised contractor VPN credential · payload: LockBit 3.0 variant
  1. 02:14:07 SentinelOne flags suspicious PowerShell + lateral SMB writes originating from HR-FS-02. Behavioral score crosses auto-isolate threshold.
  2. 02:14:41 Auto-isolate fires on 4 hosts showing the same TTP. Network segment quarantined. Pager goes out to on-call analyst.
  3. 02:17:22 Miguel Santos (Orlando SOC) acknowledges. Confirms malicious signature against Huntress ThreatOps + internal indicators. Breach declared P1.
  4. 02:22:10 Client's IT lead (Jessica) reached on third-party mobile — primary email already considered compromised. Authenticated through pre-shared IR passphrase.
  5. 02:31:55 IR VPN tunnel opened. Affected subnet fully quarantined. Exfiltration check via Umbrella DNS logs: no data egress detected.
  6. 02:48:33 Contained. 34 minutes from first alert. Contractor VPN credential revoked, 3 endpoints wiped and re-imaged from golden image.
  7. 04:02:18 Wasabi immutable-backup integrity confirmed. Zero patient records encrypted. Last successful backup: 22:00 Saturday.
  8. 06:20:00 Full restore complete. Office opens Monday 08:00 on schedule. Incident report delivered to cyber-insurance carrier Tuesday AM.
Outcome: No patient data loss. No ransom paid. No operational downtime. Insurance claim closed with zero deductible impact because detection + containment happened inside policy thresholds. Total client-side time on the incident: 2 phone calls totaling 41 minutes.
Compliance evidence, done for you

We don't sell "compliance." We deliver the packet your auditor actually wants.

Every quarter we drop a ready-made evidence package into your portal: control mapping, log samples, policy attestations, tested backups, and user-access reviews. Your staff stops fighting spreadsheets. Your assessor finishes in days, not weeks.

SOC 2 Type II
Security, availability, and confidentiality trust criteria. Most-requested by your B2B customers during procurement.
HIPAA
Healthcare PHI safeguards, BAA-ready stack, annual risk analysis and workforce training records.
PCI-DSS v4.0
Cardholder data environment scoping, quarterly ASV scans, segmentation validation.
CMMC Level 2
110 NIST 800-171 controls for DoD subcontractors. We're a registered RPO.
CJIS
Criminal Justice Information Services for agencies handling FBI-sourced data.
NIST CSF 2.0
The framework your cyber-insurance carrier is actually scoring you against.
ISO 27001
ISMS controls for clients doing business in the EU or with multinationals.
GLBA / FTC Safeguards
For financial services, including the 2023 FTC Safeguards Rule for tax preparers and auto dealers.
The humans on call

When it's 2 AM and your screens go dark, these are the people picking up the phone.

Our SOC is staffed in-house across Tampa, Orlando, and Chicago. No overseas tier-1 wall. Every analyst holds at least one current certification and has incident response experience before they take a shift.

MS
Miguel Santos
Lead SOC Analyst · Orlando
CISSP GCIH GCFA
PV
Priya Venkatesh
Incident Response Lead · Tampa
OSCP GCIH CRTO
DW
Deandre Williams
Compliance Engineer · Chicago
CISA CISM ISO 27001 LA
FAQ · the ones that actually block the sale

Five questions. Honest answers.

Do you replace our internal IT team, or work with them?

Whichever you prefer. About 60% of our cybersecurity clients have a 1-3 person internal IT team and bring us in as the security layer on top. We provide them a shared dashboard, a dedicated Teams channel, and we defer to them on anything user-facing. If you don't have internal IT we can be both, but the two pricing tiers above are security-only.

Can we leave without getting hostage'd on our data?

Yes. Every contract includes a data exit clause: within 30 days of termination we export your logs, configs, and compliance evidence to a format you choose (S3 bucket, encrypted drive, or API handoff to your next MDR). We keep nothing after day 60. This is in writing. Ask for a sample contract and check section 8.

What happens during a breach if we're over our retainer hours?

On the IR Retainer tier, the first 40 hours of any single incident are included. Beyond that we continue working at a pre-agreed $285/hr rate, invoiced monthly. We don't pause the response mid-incident to negotiate. On Essentials and Compliance tiers there's a flat $5,000 IR activation fee when an incident moves to P1, which covers the first 20 hours. Full rate card is in every proposal.

Can we see a sample SOC report before signing?

Yes, email sales@1800officesolutions.com and ask for the redacted quarterly report. It includes the executive summary, metric trends (alerts, incidents, MTTR), top threats observed, and quarterly compliance posture. You'll get it back usually same-day under an NDA we'll send first.

Do you carry cyber liability insurance?

Yes, $5M per-claim cyber liability and $10M E&O, both through an A+ rated carrier. We name our clients as additional insureds on request. Certificate of insurance available for procurement within 24 hours of asking.

Find out what's exposed before someone else does.

Our free external risk scan looks at everything an attacker can see from the open internet: exposed services, leaked credentials, expiring certificates, misconfigured DNS, and known CVEs on your perimeter. Takes about 4 minutes. You get a 1-page report the same day.

Run my free risk scan Or call (888) 574-5120