A coverage measurement per asset type.
Endpoint, server, cloud, identity, data. Per type: what the SOC sees, what it misses, and what that means for your risk position.
A diagnostic study that sharpens whether your SOC or MDR still fits what you need.
Detection changes faster than contracts. A coverage review measures what your SOC actually catches, where the gaps sit, and whether the current model fits your risk position.
Three patterns we see again and again in SOC and MDR evaluations. On the left what shows up in the organisation, on the right what that does to the detection chain.
Mean-time-to-detect, ticket volume, response time are in order. The SOC produces what the buyer asks for.
An independent measurement of coverage is missing. Which attack techniques fall outside the detection chain? The board does not know, the SOC itself does not either.
The contract expires end of quarter. The renewal proposal is ready. The board asks: do we continue this way, or not?
Without a structured measurement of what the SOC actually catches, there is no basis for an informed decision. The contract extends, the gaps remain.
Cloud migration, new SaaS stack, OT or operational expansion. The environment of two years ago is not the current one. Detection rules did not follow.
No one can pinpoint exactly where the SOC is behind. At an incident in the new stack layer, it shows up only then. Too late.
Not a detection maturity model. An actual measurement of what you catch, and where it does not match.
Endpoint, server, cloud, identity, data. Per type: what the SOC sees, what it misses, and what that means for your risk position.
From log source via SIEM detection to SOC response. Per step: what works, where noise sits, where signals disappear.
Build, buy or hybrid. Does the current model still fit, and if not, in which direction do you move. With reasoning.
Two to three weeks lead time, with the right rhythm at your end. Four steps. No RFP, an independent test of whether your current setup still fits.
Current SIEM, SOC team or MDR vendor. Which logs, which detection rules, which escalation paths.
Week 1 · D1-D22 daysWhat does the contract actually say. Response times, coverage, exit position, accountability during incident.
Week 1 → 22 daysUse-case coverage against your crown jewels and threat profile. NIS2 and DORA requirements where relevant. Which gaps sit in it.
Week 2 · D1-D33 daysClarity whether the current setup fits, concrete improvements, RFP input for renewal if desired.
Week 2 → 32 days