Skip links

SOC services required in the context of NIS2 alignment

SOC services required in the context of NIS2 alignment

More and more CISOs are coming to the conclusion that using a Security Operations Center (SOC) is the optimal solution to address a wide set of requirements of the NIS2 Directive. Although the regulation does not explicitly mention the mandatory nature of a “SOC”, it does require companies to implement specific security measures, such as monitoring, detection and incident response — all available 24/7, as well as logging, reporting, documentation and auditability measures. These are exactly the functions that a SOC performs.

NIS2 allows organizations to build an in-house SOC or outsource these functions to a specialized vendor, stating only that they must be implemented. Therefore, there is no obligation to hire dedicated staff if the monitoring, detection and response processes are outsourced to a third-party company.

Furthermore, the NIS2 Directive encourages more rigorous security audits, risk, vulnerability and incident analysis and remediation activities, and adequate user training on cyber threats. Essentially, NIS2 seeks to prevent incidents by requiring critical entities to continuously monitor security, document internal processes, and implement robust defense and response strategies.

Conclusion: NIS2 practically mandates the use of SOC services, but developing an internal SOC or outsourcing it is up to each organization.

The real challenges behind an internal SOC

While an internal SOC gives organizations direct control over their own operations and processes, implementing and maintaining one is challenging for several reasons. In Europe, in 2024, there is already a deficit of approximately 500,000 specialists (https://www.romania-actualitati.ro/stiri/romania/deficit-de-personal-in-domeniul-ciberneticii-id201425.html) in the field of cybernetics, according to DNSC, and in the Western region of Romania 78% of companies (https://adrvest.ro/start-la-inscrieri-pentru-cybertm-2025-eveniment-privind-securitatea-cibernetica-dedicat-imm-urilor-din-regiunea-vest) do not have internal cybersecurity experts, according to ADR.

Beyond the shortage of specialists, developing procedures and norms specific to an efficient internal SOC (response, analysis, alert escalation, continuous staff training) requires a long time, and the costs to ensure adequate availability and scalability are high. An internal SOC can also be difficult to scale quickly to deal with sudden increases in cyber threats, and attracting and retaining top talent can be a constant challenge, leaving the organization vulnerable to advanced attacks.

At the same time, using multiple security tools without effective integration can create operational overhead and compatibility issues, making operations slower and more expensive. As the volume of alerts increases, including many false positives, skilled personnel risk losing valuable time analyzing them. An underestimated limitation is that internal teams can be influenced by biases or organizational culture, which can affect the objectivity of risk assessment.

On the other hand, external providers can bring added value in the form of specialized expertise, but also cost savings. An analysis conducted by Safetech Innovations on the personnel costs for an internal SOC (estimated for an internal network with 10,000 endpoints) showed that by outsourcing, these costs can be reduced by 45%. At the same time, outsourcing brings a transparent and predictable cost structure, but also access to technical capabilities that are difficult to obtain from an internal SOC.

Arguments for outsourcing SOC services

1. Rapid access to advanced SOC services, correlated with other complementary security services/solutions. The SOC as a Service (SOCaaS) services offered by the Safetech STI-CERT (asset inventory, vulnerability management, monitoring, detection, investigation, response, logging, reporting, documentation, auditability) allow organizations to choose only the services they need, while also providing access to globally recognized solutions such as Endpoint Detection and Response (EDR), eXtended Detection and Response (XDR), NextGen SIEM, Vulnerability Management, Risk Management, Operational Technology Security and Threat Intelligence. The team’s experience allows the identification of the latest techniques and cyber threats and the application of customized solutions for each organization.

2. Certified skills and efficiency due to SOC activity structured on three levels of expertise. Organizations benefit from a high level of expertise through the STI CERT SOC, which includes over 30 cybersecurity specialists. The team, available 24/7/365, is made up of professionals with multiple international certifications, such as SANS, MICROSOFT, (ISC)², ISACA, CREST and EC-Council. The specialists work in three shifts to ensure continuous coverage and follow a permanent training program, guaranteeing high-quality cybersecurity services.

3. One of the most experienced teams on the local market. STI CERT has over 10 years of experience in managing a large volume of events, alerts and incidents, benefiting from advanced analysis capabilities. Monthly, the team handles, on average, 100 billion events captured by the monitored security solutions, analyzes 25,000 security alerts and manages an average of 180 incidents. STI CERT serves clients from various sectors, including banking and finance, utilities, healthcare, technology, retail, distribution and consulting. In addition, Safetech Innovations was included in the prestigious Top 250 MSSPs 2024 by CyberRisk Alliance, which highlights the 250 best performing managed security service providers globally, being the first MSSP company from Romania included in the top, ranking 153rd.

4. High scalability – clients can quickly access additional resources in case of incidents or expansion of activity. SOCaaS through Safetech Innovations is sized to serve a large number of clients simultaneously and has a reserve for managing peaks of activity. Unlike an internal SOC, it adapts quickly to changing requirements, and beneficiaries can scale security services without the need for additional investments.

5. Short service activation time, significantly reduced than in the case of developing an internal SOC. Safetech Innovations’ SOC team has an organized process for rapid service activation. Services provided by STI CERT can use the client’s own platforms, platforms provided by Safetech as an MSSP (Managed Security Services Provider), or a mixed model, to optimize costs and reduce operational impact.

6. Existing procedures and policies, with automated workflows that ensure a high level of efficiency. The Safetech team recommends a minimal technological architecture, which respects the principles of simplicity and defense in depth through automation, including Endpoint Detection and Response (EDR) to protect critical entry points and a multi-technology platform eXtended Detection and Response (XDR), which centralizes alerts and logs in a single SOC monitoring panel. Safetech Innovations also provides vulnerability management, risk analysis, security indicator management. asset monitoring in OT/ICS environments), using additional specialized tools.

7. Financial accessibility – no initial investment in equipment and licenses, with flexible monthly payment depending on the evolution of the activity. STI CERT services offer a competitive price, predictable costs and financial stability, allowing companies to eliminate the investments and expenses associated with developing and operating an internal SOC. Organizations can choose from three outsourced SOC service packages, customizable according to the needs and resources of each client, and all STI CERT services are covered by a EUR 500,000 insurance policy, with specific clauses for cyber risks.

Safetech SOC as a Service

What do Safetech outsourced SOC service packages contain?

The Security Operations Center (SOC) within Safetech Innovations contains experienced security specialists, capable of identifying and quickly responding to a wide range of cyber threats. Through continuous monitoring, early detection and incident investigation, the SOC protects the entire digital ecosystem – from endpoints and networks, to servers, critical applications and cloud infrastructures. To this end, it uses advanced technologies such as SIEM, SOAR and EDR/XDR, complemented by standardized procedures and automated playbooks. The result is a 24/7 active cyber defense that increases organizational resilience and security, in line with NIS2 regulations:

  • Onboarding and integration services – quickly connecting new systems and users to the SOC infrastructure, configuring access and integrating data flows with other existing applications or IT solutions.
  • Monitoring, detection and rapid response, 24/7, 365 days a year – proactively identifying threats and taking immediate actions to isolate and remediate.
  • Advanced tools – SIEM, EDR/XDR, SOAR, IDS/IPS and ML analytics to reduce false positives and prioritize alerts.
  • Asset Inventory and Risk Management – ​​complete visibility into IT architecture, asset classification and vulnerability identification, security testing.
  • Specialized team – analysts, engineers and SOC managers with expertise in investigation and incident response.
  • Cyber ​​Threat Intelligence (CTI) – access to global and industry-specific threat data streams in which the organization operates, complemented by threat analytics for proactive protection.
  • Documented processes, well-defined procedures – playbooks for detection, investigation, isolation, remediation and recovery, tested periodically.
  • Continuous improvement – ​​configuration optimization, tool tune-up and procedure refinement for increased efficiency.
  • Governance, Risk and Compliance (GRC) – implementing standardized policies and procedures, continuously monitoring compliance with internal rules and assessing cyber risks for informed decision-making, in line with the organization’s business objectives.
  • Reporting and compliance support – collecting and centralizing logs, generating reports and event traceability, ensuring compliance with regulations such as NIS2, GDPR or ISO standards.

Outsourcing a Security Operations Center to Safetech Innovations offers all the services listed above, which it complements with an extensive portfolio of over 40 solutions from renowned manufacturers, implemented by a team of approx. 80 specialists, including DNSC accredited auditors. With over 1000 consulting and testing projects, including the protection of critical IT&OT infrastructures and STI CERT clients, we guarantee continuous monitoring, rapid incident response and complete support for governance, risk and compliance, thus being a reliable partner for organizations that must comply with NIS2 requirements.

For information about the services and solutions presented, you can contact us by email at sales @ safetech.ro or by phone at +40 21 316 0565.

Overview of Privacy

This website uses cookies to provide you with the best user experience. Cookie information is stored in your browser and serves the purpose of recognizing you when you return to our site, as well as assisting our team in understanding which sections of the site you find more interesting and useful. For more information, you can refer to the General Information Note Regarding the processing of personal data.