Managed Cybersecurity Services Built For Regulated Raleigh Businesses
A full managed security program for growing organizations in North Carolina that need 24/7 threat detection, incident response on retainer, vulnerability management, and compliance-grade evidence capture. Human analyst coverage paired with an AI fleet so alerts are triaged in minutes, not hours. Founded 2002 in Raleigh. CMMC-AB Registered Provider Organization #1449. BBB A+ since 2003.
One Program. Six Capabilities. Measured Outcomes.
Most "MSSP" contracts sold in the Raleigh market are a product bundle with a monitoring dashboard attached. Petronella Technology Group builds managed cybersecurity the other way around. The outcome is the contract. The contract defines the risk that gets retired every month, the evidence that gets produced for auditors, and the response time when something breaks glass. The technology stack underneath is a means to hit those outcomes, and we treat it like plumbing that gets swapped when a better tool appears.
A managed cybersecurity engagement with Petronella Technology Group covers six capabilities, delivered as one signed scope of work and one monthly invoice. You get security operations center coverage, endpoint detection and response tuned to your environment, managed detection and response with full incident ownership, vulnerability and patch management on a measured cadence, compliance monitoring mapped to your frameworks, and an incident response retainer with guaranteed first-analyst engagement times. Every capability feeds a shared evidence library your auditors, insurers, and leadership can query.
We operate the program with a hybrid team. Senior analysts own triage decisions, containment authority, and client communication. An AI fleet we built in-house handles log enrichment, correlation across data sources, false-positive suppression, and draft remediation plans. The human decides. The AI does the work a human would otherwise spend an eight-hour shift on. That is what turns a forty-minute detection-to-containment cycle into an eight-minute one without doubling headcount on your bill.
What Is Actually Included
Every line below is a standing capability on every managed cybersecurity engagement. Nothing is an upsell. Nothing is marked "available upon request" in the footer of page four of the agreement.
1. Security Operations Center
A staffed SOC that owns log ingestion from your endpoints, identity provider, managed firewall, email gateway, SaaS audit feeds, and cloud control plane. Coverage is 24 hours a day, 365 days a year. An analyst has eyes on any critical alert within minutes, not the next business day.
- Endpoint, identity, network, cloud, SaaS log coverage
- Correlation engine tuned per client baseline
- Playbook-driven triage with documented decision trail
- Monthly SOC report with mean time to detect and contain
2. EDR and XDR
Endpoint detection and response on every workstation, laptop, and server. Extended detection and response correlates the endpoint signal with identity, email, and network telemetry so a phishing click that leads to a credential theft that leads to a mailbox rule is caught as one incident, not three disconnected alerts.
- Kernel-level EDR agent on every covered endpoint
- Ransomware rollback with tested restore paths
- XDR correlation across identity, email, network, endpoint
- Monthly agent health and coverage audit
3. Managed Detection And Response
MDR is the response side of the SOC. When a confirmed incident fires, our team owns containment, forensic scoping, evidence preservation, legal and regulatory notification coordination, and written after-action. You are not handed an alert and wished good luck. We take the incident to closure.
- First analyst on confirmed incident inside SLA
- Isolation, account disable, and password force-rotation authority
- Forensic scoping and evidence hash-chain preservation
- Breach notification and insurance coordination support
4. Vulnerability And Patch Management
Authenticated vulnerability scanning across every in-scope asset, weighted by exploit intelligence, remediated on an SLA that reflects business impact and compliance clock. Patch management is not the same as "we will get to it next window." Critical vulnerabilities are closed in days, not quarters.
- Authenticated scans on a measured cadence
- CVE scoring weighted by active exploitation
- Patch deployment with reboot change windows
- Exception tracking with compensating-control notes
5. Compliance Monitoring
Framework-aware alerting so the controls your auditors care about are watched with the same rigor as the ones your breach-detection engine cares about. A password-complexity drop, an MFA rollback, a disabled audit log, and a change to a privileged group all get caught and documented. Evidence lands in a library your assessor can subpoena.
- Framework mapping: CMMC L1 L2 L3, HIPAA, SOC 2, PCI, NIST
- Control drift alerting with auto-generated evidence tickets
- Monthly control-health scorecard per framework
- Assessor-ready evidence library on demand
6. Incident Response Retainer
A named retainer that reserves senior responder hours on your behalf for the incidents that do break through. Retained hours roll into forensics, threat hunting, tabletop exercises, or live incident work as your environment demands. The retainer is how you fund the response team before you need them, not after.
- Reserved senior-responder hours monthly
- Guaranteed first-call engagement inside SLA
- Rollover into hunting, tabletop, or forensics if unused
- Cyber-insurance carrier liaison if a claim opens
What Gets Measured And Reported
Every managed cybersecurity contract at Petronella Technology Group publishes these metrics on the monthly scorecard. If a number is not measured, it is not managed, and if it is not reported, it does not exist for board oversight.
Mean Time To Detect
The minutes between first observable indicator in telemetry and first analyst acknowledgement of the incident. Tracked by severity band. Rolling six-month trend on every monthly report.
Mean Time To Contain
The minutes between first analyst acknowledgement and confirmed isolation, credential rotation, or other containment action. This is the metric that moves dwell time and it is the one most MSSPs will not publish.
Patch Compliance Percentage
Critical and high-severity CVEs closed within contractual SLA versus those still open past deadline. Broken out by asset class (server, workstation, network, cloud, SaaS) because one number disguises three problems.
EDR And Log Coverage
Percentage of known assets with a healthy agent and a live log stream into the SOC. The uncovered assets are where ransomware lands, so the gap is reported at the asset level, not the summary level.
Identity Control Health
MFA enrollment percentage, privileged-account review completion, stale-account count, conditional-access policy coverage, and service-principal credential age. Identity is the actual perimeter and it is measured like one.
Compliance Control Drift
Count of framework controls that moved from compliant to non-compliant in the period, mean time from drift to correction, and percentage of controls with current evidence artifacts on file. This is the number your auditor will ask for first.
Humans Decide. An AI Fleet Does The Reading.
Every managed security provider claims 24/7 coverage. Fewer can explain what happens at 2:14 AM on a Sunday when an alert fires and the Tier 1 queue already has forty-one open items. The honest answer at most shops is that the alert waits. That is the pattern that turns a ten-minute detection into a six-hour dwell time that turns into a ransomware event that turns into a Monday morning headline.
Our SOC runs a hybrid model. A Petronella Technology Group analyst is the decision authority for every confirmed incident, every containment action, every client-facing communication. An in-house AI fleet handles the work that does not require judgment. Log enrichment, identity lookup across federated directories, related-asset correlation, prior-incident context retrieval, false-positive suppression scoring, and first-draft remediation write-ups are all generated by the AI before the human reads the ticket. The analyst walks in with a decision-ready summary instead of a raw alert.
The result is a measurable compression of the detection-to-containment cycle. More importantly, it is a documented one. Every AI-assisted action is timestamped, attributed, and logged in the same evidence library your auditors will review. Clients on a CMMC Level 2 or Level 3 track get the added benefit of an audit-grade trail that distinguishes human analyst actions from AI-assisted enrichment, which keeps the engagement compatible with the control attribution rules your C3PAO will ask about.
We do not reveal which specific AI platforms sit inside the fleet on public pages. Technology decisions rotate as the market improves. What does not rotate is the commitment that decisions affecting your environment are made by credentialed humans, that every action has an audit trail, and that your data is processed in infrastructure we control rather than someone else's multi-tenant soup.
The First 30 Days
Every managed cybersecurity engagement runs through the same onboarding. Nothing skipped. Nothing assumed. The first thirty days are how we earn the right to keep the contract.
Discovery And Asset Inventory
Authenticated sweep of every endpoint, server, firewall, switch, identity store, SaaS tenant, and cloud account. The inventory is the one artifact no incoming MSSP ever finishes correctly, so we finish it first.
Baseline And Gap Report
Control-by-control baseline against your applicable frameworks plus a first vulnerability scan. You receive a written gap report with remediation priority, owner, and target close date before week two ends.
Tooling Deployment
EDR and XDR agents, log forwarders, identity connectors, and SaaS audit integrations deployed in change-controlled waves. Rollback plans are written before any agent lands on a production asset.
SOC Cutover
Alert streams go hot in the SOC with a staged severity ramp. Tier 1 suppression rules are tuned against two weeks of your real noise before high-severity automation is enabled, so you do not get a hundred false pages in week one.
Runbook And Tabletop
We co-author the top five incident runbooks for your business and run a ninety-minute tabletop with your leadership team before day thirty. You leave knowing exactly how a ransomware call, a stolen laptop, a BEC event, and a cloud token leak will be handled.
Evidence Library Handoff
Your named compliance owner receives live access to the evidence library with pre-built views for every framework in scope. The library is how you win audits instead of surviving them.
Right-Sized For Regulated Raleigh And Triangle Companies
The managed cybersecurity program is written for organizations between fifteen and six hundred users that face a regulated environment, a contract environment, or a high-stakes insurance environment where a loose security posture produces real business pain. That is a wider band than it sounds. It covers Department of Defense subcontractors on a CMMC clock, healthcare practices with ePHI, law firms with client trust data, accounting and wealth-management firms with GLBA exposure, engineering firms on CMMC Level 2 or Level 3 flowdowns, and insurance-renewal customers whose underwriter just asked for an attestation with teeth.
We are deliberate about who we take. Consumer-only businesses, single-practitioner offices without compliance pressure, and pure break-fix requests are not a fit. We have existing clients for decades of work, and we have declined clients whose expectations were incompatible with the program. The fit matters more than the contract count.
Regionally, the program is marketed across the Raleigh and Research Triangle area (Raleigh, Durham, Chapel Hill, Cary, Apex, Wake Forest, Morrisville, Holly Springs), and it runs for North Carolina businesses as far out as Charlotte, Greensboro, Winston-Salem, Fayetteville, and Wilmington. Coverage is geographically flexible because the SOC is cloud-hosted, but the relationship is anchored in Raleigh and the response team will be on a plane to your site if the incident calls for it.
Compliance Evidence Is The Byproduct
You do not run a managed security program and a separate compliance program. Our monitoring is framework-aware, so the evidence auditors need is already captured in the same library your incident responders use. No last-minute screenshot hunts.
Reporting Cadence That Survives A Board Meeting
One of the honest failures of the MSSP category is the monthly report. Most clients receive a color-coded PDF with bar charts that compress a month of work into numbers no one can use. An executive cannot decide anything from "847 alerts triaged, 92 percent closed." A compliance officer cannot defend anything with it at an audit. A cyber-insurance broker cannot renew coverage from it. We wrote our reporting cadence to answer a different question: what did the security program accomplish that I can tell my board, my regulator, and my underwriter about with a straight face.
The deliverables on every managed cybersecurity engagement include a monthly executive scorecard, a quarterly risk review, an annual maturity assessment, and on-demand evidence packages for audits or insurance renewals. The executive scorecard lists the incidents closed, the controls that drifted and recovered, the vulnerabilities remediated by criticality, the patch-compliance percentage by device class, and the mean time to detect and mean time to contain trended against your prior six months. Every number links back to a live query in the evidence library so a skeptical reader can audit the audit.
The quarterly risk review is an in-person or live-video meeting with your executive sponsor, your compliance owner, and your IT lead. We walk through what changed in the threat landscape, what changed in your environment, what changed in your regulatory posture, and what the next quarter will prioritize. The review ends with a written updated risk register signed by both sides. That register is the one document your auditors and your board want, and the one document most MSSPs never produce.
The annual maturity assessment re-baselines the whole program against the frameworks in scope, against the latest CMMC, NIST 800-53 Revision 5, and NIST CSF 2.0 guidance, and against emerging threat categories your underwriters are beginning to ask about. The assessment is the moment we propose what should change in the next year before you ask. That is how a pillar program earns the renewal without a price-negotiation fight.
Scope Boundaries Are Published Up Front
Managed cybersecurity is a wide field and the word gets stretched to cover work we are not the right firm for. Being honest about that is faster than burning thirty days of discovery before a misfit becomes obvious. Our managed program does not include consumer identity-theft investigation, private-investigator services, mobile-device forensic imaging using Cellebrite-class tools, iPhone or iPad data extraction for custody disputes, Graykey or Encase-based law-enforcement workflows, or name-and-shame dark-web reports produced without legal counsel review.
We partner with a trusted network of specialists for engagements adjacent to those categories. A BYOD breach that requires corporate mobile forensics is handled under our tablet and mobile device forensics scope, which is explicitly focused on corporate device-management tooling and cloud-console evidence rather than handset extraction. A civil or criminal matter requiring chain-of-custody-grade handset work is referred out to a licensed examiner.
What we do cover end to end is the enterprise stack: endpoint, identity, email, SaaS, cloud, and network. That is the surface where ransomware, BEC, credential theft, token theft, SaaS misconfiguration, and supply-chain intrusion actually occur. Naming what we are not is how we deliver what we are.
Why Local Matters For Managed Security
A managed detection and response contract sold from a national operator is a commodity. The analyst on the other end of the phone has no mental model of your environment, your vendors, your compliance posture, or your people. When an incident breaks glass, the dwell time before meaningful containment is the variable that separates a bad Monday from a public disclosure. Local relationships reduce that variable. We have walked through your building. We know the naming convention your identity admin uses. We know the vendor whose firewall your previous MSP never finished configuring. That context accelerates every incident call.
Petronella Technology Group is headquartered at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606, founded in Raleigh in 2002, with more than twenty-four years of continuous operation in the North Carolina market. We are one of a small number of local firms that also holds CMMC-AB Registered Provider Organization status, and that combination (local plus regulated-compliance rigor) is the exact reason we win engagements against larger national MSSPs. The client is not a ticket number. The client is a founder or a COO whose phone rings when something matters.
Where Managed Cybersecurity Fits
The managed program is a pillar. These are the related services your security stack usually needs alongside it or underneath it.
Questions Prospects Ask Before They Sign
How is managed cybersecurity different from managed IT?
Do you replace my current MSP or work alongside them?
What is the response time when an incident fires?
Where is my data stored?
Do you provide evidence my cyber-insurance carrier will accept?
Can you pass a C3PAO assessment as my managed security provider?
What happens if a ransomware event occurs?
How is pricing structured?
Eight Questions That Separate Real Programs From Dashboards
If you are comparing proposals across managed security providers, use the following eight questions on every vendor (including us). The right answer is rarely the fanciest platform slide. The right answer is evidence that the vendor has thought about the outcome, not the product.
1. Who owns containment authority during an active incident? A provider that says "we notify you and wait" has already lost the containment race. Demand written isolation, credential-rotation, and privileged-session-terminate authority in the contract.
2. What is the analyst-to-client ratio at 3 AM on a Sunday? 24/7 marketing copy does not answer this. Ask for the on-call staffing math. Ask what happens when two clients page at once.
3. How is evidence produced for auditors? If the answer is "we will pull logs when you ask," the program will fail its first serious audit. The evidence library should be live, queryable, and pre-mapped to your frameworks.
4. What is the written SLA for mean time to detect and contain? Marketing averages do not count. Demand a number in the contract, tied to a service credit if missed.
5. How do you handle identity attacks? Ransomware lands through identity now, not through perimeter. If the provider cannot explain conditional-access, token-theft detection, and session-risk policies in operational terms, they will miss the intrusion.
6. Can you pass a CMMC Level 2 assessment as our security provider? The answer requires evidence of RPO status, shared-responsibility matrices, and control attribution. Vague assurance fails the first DCMA visit.
7. What is the termination clause? A contract that locks you in for thirty-six months without a performance out is a product sale, not a service partnership. We offer annual terms with measurable out clauses.
8. Who is the named executive sponsor on our account? If the answer is a rotating support email, the relationship is transactional. Demand a named sponsor with escalation authority.
Ready For A Program Instead Of A Product?
A thirty-minute scoping call tells us whether managed cybersecurity is the right engagement for your environment. If it is not, we will say so.