Skip to main content

SOC in a Box

Small Business Security Cyber Essentials Cyber Security Fundamentals GDPR Ransomware Threat Intelligence Cyber Security SMB Security SOC in a Box Development Diary Small Business Phishing Data Protection Sector Analysis Data Breach Compliance UK Cyber Security DSPT Supply Chain Security NCSC Cyber Threats CQC NHS Data Security ICO Risk Management Email Security Access Control Manufacturing Podcast Cyber Defence Passwords AI Security Qilin SOC Supply Chain MFA Accountancy Cyber Security ICAEW Dental Cyber Security Engineering Cyber Security GP Surgery Cyber Security IFA Cyber Security Law Firm Cyber Security SRA Retail Cyber Security PCI DSS School Cyber Security Veterinary Cyber Security Healthcare Security Governance UK Compliance IoT Security UK Small Business IPInsights Threat Landscape Malware Clop Cyber Essentials Plus Certification Threat Detection Deception Technology UK Business Network Security Third-Party Risk Patch Management Social Engineering Defence Supply Chain AML Consulting Cyber Security Wealth Manager Security Operational Resilience E-commerce Security GDPR Retail MAT Cyber Security GDPR Schools Safeguarding RCVS Managed SOC Board Reporting Data Loss Prevention Incident Response Managed Security Cyber Insurance Cyber Risk Getting Started Smart Devices Financial Impact Inside the Box Weekly Roundup AI Threats Banking Security Cyber Essentials Certification Q1 2026 Dragonforce Security Engineering Threat Monitoring Honeypots Digital Sovereignty Payments Made in Britain Supply Chain Risk Password Safety Signal WhatsApp Business Communications Messaging Security Supply Chain Attack Docker Kubernetes Credential Theft Open Source Security DevOps Security Practice Security Financial Data Protection Government Procurement DCPP HMRC Agent Security IP Protection NHS Security FCA Conveyancing Fraud DfE Standards DfE Cyber Standards Safeguarding Data Ofsted FCA Compliance SM&CR GDPR Financial Services ACCA Practice Compliance FCA Cyber Security Financial Services Security Card Payment Security Academy Cyber Security Education Sector Security Legal Compliance UK Certification Card Payment Compliance Legal Sector Security Cyber Attacks Security Operations Microsoft 365 Cloud Security Business Email Compromise BEC Fraud Financial Fraud OSINT Reconnaissance Attack Surface Construction Sector DLP Cyber Attack Crisis Management Insider Threats User Behaviour Multi-Factor Authentication Holiday Period Attacks Dark Web 2025 Annual Report Global Cyber Security RaaS Cyber Security Policy Security Costs SOC as a Saving MDR Antivirus Cyber Security Basics Security Operations Centre Lessons Learned Deployment Onboarding Confidence Score Analyst Model Service Design DecoyPulse EmilyAI SOC365 Detection Engineering Hardware Product Design Platform Update Security Checklist Risk Assessment Remote Working Hybrid Working VPN Security Awareness Staff Training Least Privilege User Management Physical Security Clean Desk Mobile Security BYOD MDM Web Security Safe Browsing DNS Filtering DMARC Wi-Fi Security Firewalls Software Updates Vulnerabilities Backups Ransomware Recovery Business Continuity Password Manager Asset Management
Article 6 October 2025 9 min read

What We Learned Building SOC in a Box

Ten weeks of development diary concludes with the honest account: what we got right, what we got wrong, and what SOC in a Box looks like now it's live.

SOC in a Box Development Diary Lessons Learned
Read article
Article 29 September 2025 8 min read

Five Days: From Order to 24/7 Monitoring — How the Deployment Actually Works

Most SOC deployments take months. SOC in a Box takes five working days. Here's exactly what happens on each of those days — and why the timeline is achievable.

SOC in a Box Development Diary Deployment
Read article
Article 22 September 2025 6 min read

The Confidence Score: One Number That Tells Your Board How Protected You Are

The Confidence Score gives your board one clear number on cyber security posture. Built for decision-makers, not engineers.

SOC in a Box Development Diary Confidence Score
Read article
Article 15 September 2025 7 min read

Why Every SOC in a Box Client Gets a Named Analyst, Not a Ticket Queue

Every SOC in a Box client gets a named security analyst who knows their environment. Learn why we chose this over a ticket queue.

SOC in a Box Development Diary Analyst Model
Read article
Article 8 September 2025 6 min read

DecoyPulse: Deception Technology That Generates Zero False Positives

DecoyPulse brings deception technology to small businesses. If something touches a decoy, it shouldn't be there. Zero false positives by design.

SOC in a Box Development Diary DecoyPulse
Read article
Article 1 September 2025 7 min read

EmilyAI: The Triage Layer That Keeps Human Analysts Focused on Real Threats

EmilyAI pre-processes and enriches alerts before they reach human analysts. Learn why AI triage matters more for small organisations.

SOC in a Box Development Diary EmilyAI
Read article
Article 25 August 2025 7 min read

The Same Engine: Integrating SOC365 With a Compact Sensor

How SOC in a Box connects to our enterprise SOC365 platform with zero compromise on detection quality. The architecture explained.

SOC in a Box Development Diary SOC365
Read article
Article 18 August 2025 8 min read

Building the Box: Hardware Decisions for a Hardened SOC Appliance

What goes inside a SOC in a Box appliance? From form factor to encryption, here's every hardware decision we made — and why we made it.

SOC in a Box Development Diary Hardware
Read article
Article 11 August 2025 14 min read

The Idea: What If We Could Put a SOC in a Box?

SOC in a Box started from a pattern in incident response callouts. Learn how the idea went from concept to a fully built product.

SOC in a Box Development Diary Product Design
Read article
Article 4 August 2025 6 min read

Why Small Organisations Can't Get a Real SOC — And Why That's Wrong

The cybersecurity industry has spent years telling SMBs they don't qualify for a proper SOC. We decided to prove that wrong. Here's why we started building.

SOC in a Box SMB Security Development Diary
Read article