Cloud-native mid-market
200–2,000 employees, AWS / GCP / Azure first, EDR + SIEM in place, 1–10 named security engineers. Buying signal: dwell time and FP rate are tracked, not hidden.
How we engage
We frame engagements around what changes in your queue, your dwell time, your audit posture, and your AI risk surface. List prices arrive when packaging is finalized; outcomes are committed before contracting.
Ideal customer profile
We are direct about who this is for. If your stack and posture do not match, we will tell you in the first meeting and refer you to a partner that fits.
200–2,000 employees, AWS / GCP / Azure first, EDR + SIEM in place, 1–10 named security engineers. Buying signal: dwell time and FP rate are tracked, not hidden.
Financial services, healthcare, life sciences, regulated SaaS. Audit cycles drive procurement. Buying signal: SOC 2 Type II is contractual, FedRAMP or HITRUST is on the roadmap.
Companies shipping LLM agents to production. Real prompt-injection threat model, real OAuth-grant blast radius. Buying signal: 'we do not have a way to detect agent abuse today.'
Engagement tiers
Each tier is priced to an outcome we will commit to before contracting. List prices land when packaging is finalized; until then, scoping is concrete and bounded.
IronSOC operates as the detection, triage, and response layer above your existing SIEM and EDR. AI does evidence prep and recommends; analysts approve business-impacting actions; recovery runbooks are co-authored during onboarding.
Wraps your production AI surface — prompts, retrieved context, tool calls, MCP servers, OAuth grants — with detection, policy, and approval gates. Pairs with red-team campaigns so findings ship as runtime detections, not PDFs.
Risk-ranked remediation queue driven by KEV, EPSS, asset reachability, and business criticality. The same ranking drives detection priority, so patch backlog and detection backlog share one risk model.
Analyst leverage thesis
The whole AI-SOC bet is that analyst:customer ratio collapses as you scale. We treat that as a measurable claim, not a pitch line. These are the four signals we report in every quarterly business review.
We measure how many alerts move from open to closed — with full evidence — per analyst hour. The leverage from AI shows up here or it does not.
We track infrastructure and AI-token cost against the number of identities, workloads, and AI agents under coverage. Cost should compress as the estate scales; we report it openly to customers in QBRs.
Detections are versioned with positive and negative cases. Quarter-over-quarter precision and recall are visible to the customer. Drift is treated as a backlog item.
We commit to a time-to-first-detection target during onboarding. If we miss it, the contract pauses until the gap is closed.
Onboarding timeline
We publish the timeline before contracting and treat misses as our problem, not yours. The contract pauses on a missed acceptance metric until the gap is closed.
Map the stack, the AI surface, the asset graph, and the recovery requirements. Output: scoped operating model and acceptance metrics.
Connect SIEM, EDR, identity, cloud, and AI sources. Run integration smoke checks against a per-source detection sample.
Tier 1 detections promoted through eval CI to production. Time-to-first-detection captured against the contract target.
Run tabletop drills against the customer-specific recovery playbooks. Adjust runbooks until the tabletop ends with restoration, not just containment.
QBR against published metrics: dwell, FP rate, MTTR, cost-to-serve, eval lift, recovery readiness. Misses are owned, not glossed.
We do not list customer logos until the customer has approved the listing in writing. This page replaces the absent logo wall with the policy itself.
Partner posture
Channel program is targeted for Series A. Today, deals close direct. Resellers and MSSPs interested in the operating model can reach the founding team.
We engage carriers as customers go through underwriting. Carrier-specific reporting is available for IronSOC customers who request it.
Selective. We work with security-focused VARs and SI partners who can co-staff onboarding. We do not sub-contract incident response — that stays with IronSOC.