■ Managed Cybersecurity & Network Services Catalog

Black Belt Network Security

Proactive managed protection tailored for small to mid-sized businesses.

★ SOC Now Powered by SentinelOne EDR / XDR ★

Black-Belt-Level Defense for Your Business

At Black Belt Network Security, we deliver proactive managed cybersecurity and network protection tailored for small to mid-sized businesses — combining advanced monitoring, preventative maintenance, and rapid response to keep threats at bay and your operations running smoothly.

🛡
Service Model

Fixed-Fee Managed Services

Predictable, monthly protection for continuous monitoring and management, including our in-house NOC and SOC.

📋
Service Model

Project-Based Services

Targeted, one-time engagements for specific needs such as assessments, implementations, or testing.

📈
Always Included

Unlimited Remote Support

All ongoing services include unlimited remote support, proactive alerting, and monthly reporting.

Comprehensive Managed Protection

Each service is delivered by our in-house team with 24/7 coverage where applicable.

🚫
SOC

24/7 SOC Monitoring & Rapid Incident Response

Continuous Security Operations Center coverage powered by SentinelOne EDR/XDR for real-time threat detection and response.

  • 24/7 monitoring across endpoints, network, and cloud
  • SentinelOne EDR/XDR telemetry & Storyline™ correlation
  • Log analysis, SIEM correlation, and threat hunting
  • Automated remediation and one-click rollback
  • Alerting and escalation per agreed paths
📡
NOC

In-House NOC Service

Centralized 24/7 monitoring and management of your network infrastructure and servers.

  • Real-time performance monitoring & alerting
  • Incident detection & resolution
  • Proactive maintenance
  • Escalation to specialized teams as needed
🖥
Servers

Managed Server Security

Full oversight for on-prem or cloud servers.

  • Advanced performance monitoring
  • Configuration management & changes
  • OS patching
  • Preventative maintenance
🔌
Network

Managed Network & Firewall

Perimeter and internal network defense.

  • Firewall rule management
  • NAT/PAT & ACL updates
  • Router/switch monitoring & mapping
  • IP management & wireless security
  • Network performance optimization
🔒
Cybersecurity

Managed Cybersecurity Suite

Layered threat protection anchored by SentinelOne's AI-powered platform.

  • SentinelOne-powered MDR/EDR & threat hunting
  • Automated threat remediation & rollback
  • Email/phishing defense
  • MFA enforcement & configuration
  • Dark web monitoring
  • SIEM/log management (advanced)
  • Web filtering
Cloud

Cloud Security Management

Secure your Microsoft 365 and Azure environment.

  • Configuration & optimization
  • Security monitoring
  • Compliance basics
SentinelOne EDR / XDR Services
🛡

Powered by SentinelOne

Our SOC leverages SentinelOne as its primary endpoint security platform — AI-powered prevention, real-time detection, autonomous response, and deep threat visibility across all managed endpoints.

🌏 A. Endpoint Protection Platform (EPP)

AI-powered prevention before threats execute.

  • Static AI analysis — pre-execution detection without signatures
  • Behavioral AI (BEHAVIOT™) — catches zero-days, fileless & LotL attacks
  • Multi-platform — Windows, macOS, Linux, cloud workloads
  • Device & application control — USB, Bluetooth & app-execution policies

🔎 B. Endpoint Detection & Response (EDR)

Full-fidelity telemetry and rapid investigation.

  • Storyline™ — auto-correlates events into a complete attack story, slashing MTTI
  • Real-time alert triage — SOC analysts review Storyline-enriched alerts
  • Deep Visibility™ — SQL queries over up to 365 days of telemetry
  • STAR rules — custom automated detection & response triggers

⚡ C. Autonomous Threat Response

Millisecond-speed response — faster than any manual process.

  • Automated mitigation — process kill, quarantine, registry removal, network isolation
  • One-click rollback — VSS-based rollback to pre-attack state; neutralizes ransomware
  • Endpoint isolation — network-isolated while SOC retains connectivity
  • Opt-out available — manual-only mode available on request

📊 D. Threat Intelligence & Proactive Hunting

Surface novel and stealthy threats before they cause damage.

  • Threat intelligence — real-time IoC correlation against cloud intel & third-party feeds
  • SOC-led hunting — Deep Visibility™ & STAR rules target persistent adversary activity
  • Cloud workload protection — containerized & cloud-native visibility
  • IoT/rogue detection — Ranger™ surfaces unmanaged devices

📶 E. Ranger™ Network Discovery

Passive network mapping — no additional hardware required.

  • Identifies unmanaged endpoints, rogue & IoT devices
  • Enriches asset inventory, flags agent-less machines
  • Discovery results surfaced in monthly SOC reporting

📄 F. Reporting & Visibility

Full transparency into your security posture every month.

  • Monthly SentinelOne threat summary in your SOC report
  • On-demand read-only console access (upon request)
  • Quarterly threat-hunting review with findings & techniques
Flexible, Transparent Pricing

No surprises — choose the model that fits your business.

📅 Fixed-Fee Ongoing

Predictable monthly billing for continuous NOC & SOC protection. Annual prepay discount available.

📋 Project-Based

Scoped one-time engagements with defined deliverables, invoiced per agreement.

👥 Custom Packages

Combine ongoing and project-based models into a tailored package.

💳 Billing

Monthly via ACH or credit card. Annual prepay discounts available.

🕒 Contract Length

12–36 months standard. Month-to-month available at a premium.

🚫 Exclusions

Out-of-warranty hardware, travel >50 miles, third-party software licenses, major custom development.

Statements of Work

Expand each appendix to review the full scope, responsibilities, SLOs, and key terms.

Overview

The goal of our NOC is to maintain the performance and availability of your servers and endpoints with 24/7 monitoring and support.

Coverage & Capabilities

  • 24/7 remote monitoring of device health, uptime, bandwidth, latency, and performance via RMM
  • Configuration management — documented configs, backups, and controlled changes
  • Firmware updates & patching on a scheduled, tested basis
  • Performance optimization & troubleshooting
  • Proactive maintenance — hardware health monitoring
  • Incident response & break-fix with remote-first approach

Access Levels

  • Level 0 — No login; ticket + your approval required before any work
  • Level 1 — Login & diagnose; your approval required to resolve
  • Level 2 — Login, diagnose, fix non-restart issues; approval required for restarts
  • Level 3 — Full access; login, diagnose, fix, restart; all work documented

In-Scope Services Include

  • Server / Internet down management with LOM support
  • Patch management — Microsoft, Apple, third-party
  • OS drive disk space management
  • Windows Server, Active Directory, Exchange/M365 management
  • Virtualization support (VMware, Hyper-V, Citrix XenApp)
  • DHCP, RDS, IIS, SharePoint, SQL Server, VSS management

Out-of-Scope

  • Third-party backup configuration or data restoration
  • SAN/NAS storage configuration or troubleshooting
  • Direct support of third-party applications (QuickBooks, MySQL, etc.)
  • Ad-hoc requests exceeding 60 minutes/month without prior approval
  • Custom reports or custom monitors

Service Level Objectives

ActivityTarget
Acknowledge emails99% within 4 hours
Acknowledge tickets95% within 4 hours
Begin work on server-down tickets (with LOM)99.5% within 15 minutes
Begin work on critical/emergency incidents98% within 1 hour
Status updates on critical incidents95% every 3–4 hours
Resolution rate (full access levels)80% within 24 hours

Service Description

Our SOC provides 24×7 monitoring, detection, investigation, escalation, and incident support, leveraging SentinelOne's AI-powered platform integrated with our SIEM, threat intelligence, and analyst workflows.

Incident Investigation & Response

  • Monitor alerts and security events within our supported toolset
  • Remote analysis and investigation to classify events
  • Triage confirmed incidents (scope, urgency, impact) and escalate per agreed paths
  • Analyze assets/traffic and document attacker profiles
  • Assess potential data exfiltration using security tools

MDR — Host Isolation / Containment

  • Isolate endpoints with installed agents to prevent malicious spread
  • Isolated machines retain SOC connectivity but lose network/Internet access
  • Contain unmanaged devices to block communication with managed endpoints
  • Client must provide a list of production servers excluded from isolation

Automated Remediation

  • Run scans, kill processes, quarantine files, remediate/roll back threats
  • Restrict apps and isolate/contain devices via MDR agents
  • Opt-out available — all actions then require analyst initiation

SentinelOne-Specific In-Scope Services

See the SentinelOne SOC Platform section above for the full breakdown of EPP, EDR, Autonomous Threat Response, Threat Hunting, Ranger™ Network Discovery, and Reporting included in the SOC service.

Your Responsibilities

  • Maintain adequate Internet connectivity for monitoring tools
  • Supply accurate, up-to-date Points of Contact info
  • Notify us ≥24 hours in advance of maintenance/network changes
  • Keep SentinelOne agents on supported versions with all managed endpoints connected and reporting
  • Do not exclude machines from SentinelOne policy without coordinating with our SOC

Out-of-Scope

  • Modifying network configurations or troubleshooting network performance
  • Fixing database corruption or end-client training
  • Hardware-related issues (disk, memory, power supply)
  • ISP outages or on-site support at client locations

Service Level Objectives

CategoryTarget
MDR / SentinelOne Initial Threat AnalysisWithin 1 hour of alert
SentinelOne Autonomous Response (if enabled)Milliseconds — immediate upon detection
SIEM Initial Threat AnalysisPer product SKU SLO
Client Ticket — Low/MediumResponse within 4 hours
Client Ticket — HighResponse within 2 hours
Client Ticket — UrgentResponse within 1 hour
Voicemail ResponseClassified Urgent; 1-hour goal
MDR
Managed Detection and Response — advanced threat hunting and response delivered as a managed service.
EDR
Endpoint Detection & Response — continuous monitoring, detection, and response for threats on endpoints.
XDR
Extended Detection & Response — unified security telemetry and response across endpoints, network, cloud, and identity.
SentinelOne
AI-powered cybersecurity platform providing EPP, EDR, and XDR with autonomous threat prevention, detection, and rollback-based remediation.
Storyline™
SentinelOne's patented technology that automatically contextualizes and correlates related security events into a complete attack narrative.
Deep Visibility™
SentinelOne's advanced threat hunting engine enabling SQL-based queries of historical endpoint telemetry.
STAR
Storyline Active Response — SentinelOne's custom automated detection and response rules engine.
Ranger™
SentinelOne's passive network discovery capability mapping managed and unmanaged devices using existing agents.
EPP
Endpoint Protection Platform — pre-execution threat prevention using AI/ML and behavioral analysis.
RMM
Remote Monitoring and Management — proactive system oversight tools used by the NOC.
NOC
Network Operations Center — centralized 24/7 network monitoring and management.
SOC
Security Operations Center — 24/7 security event monitoring and incident response.
SIEM
Security Information & Event Management — centralized log collection, correlation, and alerting platform.
IoC
Indicator of Compromise — forensic artifact (IP, hash, domain, etc.) indicating a potential breach.
LotL
Living off the Land — attacker technique using legitimate system tools to evade traditional security controls.
LOM
Lights-Out Management — remote hardware management interface (e.g., iDRAC, iLO).
Start Verifying Everything.

Most breaches exploit implicit trust. Let's close those gaps — starting with a no-pressure conversation about your environment.

General Inquiries / Quotes
Phone