Managed XDR Services 24/7 SOC, MTTR Under 15 Minutes
Petronella Technology Group runs a 24/7/365 human SOC correlating endpoint EDR, network NDR, identity IDR, cloud workload, and email signals into a single response platform. Every alert that crosses the severity threshold is reviewed by a credentialed analyst within minutes, not parked in a queue. Built on an enterprise private AI cluster for detection engineering, vendor-agnostic across CrowdStrike, SentinelOne, Microsoft Defender, Sophos, Palo Alto, and Fortinet.
Inside the Petronella Managed XDR Suite
A short walkthrough of the SOC console, the correlation engine, and the live response actions the analyst takes when a confirmed threat fires.
One SOC. Five Telemetry Domains. One Response Loop.
Managed Extended Detection and Response, sometimes called MXDR, is a single security service that pulls together five different telemetry domains and runs them through one correlation engine, watched by one 24/7 SOC, under one contract. Endpoint EDR tells you what is happening on the laptop. Network NDR tells you what is happening between the laptop and everything else. Identity IDR tells you what is happening to the credential that authenticated. Cloud workload detection tells you whether the same identity then touched the AWS or Azure environment. Email security tells you whether the original lure that started this chain came through your inbox. Stitched together they describe an attack. Pulled apart, each tool answers a different question and the attacker walks between the gaps.
Petronella Technology Group has been running this work in North Carolina since 2002. The firm holds CMMC-AB Registered Provider Organization status, number 1449. Every engineer is CMMC-RP credentialed. Founder Craig Petronella holds CMMC-RP, CCNA, CWNE (Certified Wireless Network Expert), and a state-issued Digital Forensics Examiner credential, license number 604180. The firm maintains a BBB A+ rating continuously since 2003. None of those acronyms run a SOC by themselves, but they tell you who is going to be holding the response keys to your environment when the alert fires at 02:17 on a Saturday.
The cost case for MXDR over a build-it-yourself SOC is rarely close. Industry salary surveys put a credentialed SOC analyst at roughly $95,000 to $140,000 per year fully loaded. Twenty four by seven by three sixty five coverage requires six analysts at minimum to cover shifts, holidays, vacation, and sick days. Add a detection engineer, a SOC lead, and the licensing for the SIEM and the EDR and the cloud detection platform and the threat intelligence feeds, and the internal-build bill clears one and a half to two million dollars annually before the first alert fires. Petronella's managed model delivers the same capability at a fraction of the cost because the SOC, the platform, and the detection engineering are amortized across many clients. The bill of materials becomes a known monthly line item rather than a hiring and retention problem.
Equally important, an internal-build SOC ages quickly. The threat landscape moves faster than the typical security hiring cycle. The attacker tradecraft that mattered in 2022 looks different from the attacker tradecraft that matters today. Petronella's detection engineering team updates correlation rules, MITRE ATT&CK mappings, and threat intelligence indicators continuously, with every client benefiting from every detection improvement. That is the operational advantage that a single-client internal SOC simply cannot match without unsustainable headcount.
EDR vs MDR vs XDR vs MXDR vs SIEM
The acronyms get sold interchangeably. They are not the same product, they do not produce the same evidence, and they do not satisfy the same audit clause. Below is the clearest plain-English breakdown.
EDR
Endpoint Detection and Response. Software agent on the laptop, desktop, or server. Detects malicious processes, suspicious behavior, and known IOCs at the host level. CrowdStrike Falcon, SentinelOne Singularity, Microsoft Defender for Endpoint, Sophos Intercept X all live in this category. EDR alone has no view of the network, the identity, or the cloud.
MDR
Managed Detection and Response. Someone else operates the EDR for you, watches the alerts, and triages. Scope is generally limited to the endpoint signal. MDR is a useful baseline service if you do not have an internal SOC, but it cannot see lateral movement, identity abuse, or cloud-side compromise unless you bolt on additional tools and contracts.
XDR
Extended Detection and Response. A correlation platform that pulls endpoint, network, identity, cloud, and email telemetry into one engine. The product category, not the service. You can buy an XDR platform and operate it yourself, the same way you can buy an EDR and operate it yourself. Operating it well requires detection-engineering and SOC capability you may not have.
MXDR
Managed Extended Detection and Response. XDR delivered as a service with a 24/7 SOC. One contract, one platform, one phone number when the alert fires. Petronella runs MXDR. The SOC is the buying party from the platform vendors so the customer gets a unified service-level commitment instead of a stack of separate ones.
SIEM
Security Information and Event Management. A log aggregation and search platform with correlation rules layered on top. Splunk, Microsoft Sentinel, Elastic Security all live here. SIEM is a critical infrastructure component, but on its own it is a log search appliance. Without analysts watching it 24/7 and tuning the rules continuously, a SIEM is an expensive disk array.
SOAR
Security Orchestration, Automation, and Response. Playbook engine that takes a SIEM or XDR alert and triggers automated containment actions across the rest of the security stack. Petronella's MXDR includes SOAR-style playbooks for endpoint isolation, identity revocation, and Conditional Access policy enforcement, with human review on every irreversible step.
NDR
Network Detection and Response. Sees east-west and north-south traffic, flags command-and-control beaconing, lateral movement, and data exfiltration. NDR is one of the five telemetry streams Petronella's MXDR correlates. On its own it is blind to what happens inside the endpoint and the identity provider.
IDR
Identity Threat Detection and Response. Sees credential abuse, impossible-travel logins, MFA fatigue, OAuth token theft, golden-ticket forgery. As identity becomes the primary attack surface for cloud-first organizations, IDR has moved from a nice-to-have to a non-negotiable component of any serious detection program.
CDR
Cloud Detection and Response. Watches AWS CloudTrail, Azure Activity Logs, Google Cloud Audit Logs, Kubernetes audit streams, and SaaS audit feeds for misconfiguration, privilege escalation, and post-compromise persistence. The cloud-native detection layer most internal teams either ignore or hand-roll.
Detect, Respond, Rehearse
Every Managed XDR engagement collapses to three operational stages. NIST SP 800-61 Revision 2 (Computer Security Incident Handling Guide) and the MITRE ATT&CK framework sit underneath these stages as our operational standard.
24/7 Detection
Endpoint, network, identity, cloud, and email signals flow into the correlation engine in near-real time. Detection rules are MITRE ATT&CK mapped so every alert carries a tactic-and-technique tag that maps to the same vocabulary your threat-intel feed, your red-team report, and your cyber insurance underwriter use. SOC analysts watch the queue 24/7/365. Automated playbooks handle initial containment within seconds on confirmed indicators (endpoint isolation, identity lockout, Conditional Access push). Human review precedes any irreversible action. Detection engineering tunes rules continuously based on telemetry from the entire managed client base, which means every client benefits from every new attacker tradecraft observed across the fleet.
Live Response
The mean-time-to-respond target on critical alerts is under 15 minutes from detection to first containment action. The SOC analyst calls or messages the designated client point of contact during the same window, with the case ticket, the evidence trail, and the recommended next steps. For confirmed incidents that require full investigation, the IR retainer activates and the case is escalated to a Tier-3 lead with the digital-forensics-examiner credential on file. We coordinate with your legal counsel, your cyber insurance carrier, and where applicable the FBI or law enforcement contact named in your IR plan. The objective is containment first, eradication second, recovery third, and lessons-learned fourth - the NIST SP 800-61 sequence executed in real time.
Quarterly Tabletop + Retest
Detection without rehearsal is theory. Every MXDR engagement includes one tabletop exercise per quarter at no additional cost. We script a realistic scenario from current threat intelligence (ransomware, business email compromise, supply chain compromise, insider exfiltration), walk your leadership, IT, legal, and communications teams through the response sequence, and close with a written after-action report that satisfies CMMC IR.L2-3.6.3 (incident response testing) and HIPAA contingency-plan testing requirements. The tabletop output also feeds the next cycle of detection-rule tuning so the SOC and the client team are always working from the same playbook.
DIY EDR vs MSP MDR Add-On vs Petronella MXDR
Three different buying patterns, three different audit conclusions, three different bills. The decision is rarely about feature lists. It is about which one produces evidence that holds up when something tries to break it.
If a vendor quotes you MXDR pricing at half the going rate, the bill of materials is short something. Usually it is the human-SOC line item. The most expensive part of the service is the credentialed analyst at 02:17 on a Saturday with the authority to isolate a domain controller without waiting for a Monday-morning email approval. That capacity is the line item that determines whether the incident is contained or whether you read about it on Monday.
Five Telemetry Domains, One Correlation Engine
Each domain catches a different attacker behavior. Run them in isolation and the attacker walks between them. Run them correlated and the attack chain shows up as one timeline instead of five fragments.
Laptops, Desktops, Servers
Behavior-based detection at the host level. Catches process injection, credential theft from LSASS, suspicious PowerShell, in-memory loaders, ransomware encryption patterns. Integrates with CrowdStrike Falcon, SentinelOne Singularity, Microsoft Defender for Endpoint, Sophos Intercept X, Palo Alto Cortex XDR, Fortinet FortiEDR.
alert: T1003.001 . OS Credential Dumping . LSASS Memory . HOST-PROD-FIN-04East-West and Perimeter
Behavioral analysis of internal lateral movement, C2 beaconing patterns, data exfiltration, DNS tunneling, suspicious outbound flows to known-bad infrastructure. Pulls from firewall flow records, NetFlow, packet capture, and DNS query logs. Catches what the endpoint missed because the attacker turned the agent off.
alert: T1071.004 . DNS C2 . anomalous TXT query cadence . VLAN 30AD, Entra ID, Okta, Duo
Catches credential abuse: impossible-travel logins, MFA fatigue attacks, OAuth token theft, golden-ticket forgery, Kerberoasting, AD enumeration via LDAP, suspicious group-membership changes, dormant-account reactivation. Integrates with on-prem Active Directory, Microsoft Entra ID, Okta, Duo, JumpCloud.
alert: T1110.003 . Password Spraying . 14 distinct accounts in 90s . tenant EntraAWS, Azure, GCP, Kubernetes
CloudTrail, Azure Activity Logs, Google Cloud Audit Logs, Kubernetes audit streams, SaaS audit feeds. Detects misconfiguration drift, privilege escalation through IAM role assumption, cross-account access from new geographies, unexpected resource provisioning, dormant credential reuse, secrets in environment variables.
alert: T1078.004 . Valid Cloud Accounts . unexpected AssumeRole from new ASNM365, Google Workspace, Proofpoint
Inline anti-phishing analysis plus post-delivery clawback. Catches business email compromise, vendor-impersonation, payload-bearing attachments, malicious OAuth consent grants, internal-from-external spoofing, and credential-harvesting URLs that survive gateway filters. Integrates with Microsoft Defender for Office 365, Proofpoint, Mimecast, Abnormal.
alert: T1566.002 . Phishing Link . credential harvest domain . CFO inbox . post-delivery clawback initiatedManufacturing, Engineering, Utilities
Operational Technology and Industrial Control System detection scoped on request. Passive monitoring of Modbus, DNP3, BACnet, and OPC-UA traffic for anomalous commands, unauthorized firmware changes, and pivots from corporate IT into OT segments. Critical for manufacturing, engineering firms, and utilities.
alert: T0836 . Modify Parameter . unscheduled write to PLC tag . OT segmentWhat You Get From Petronella That You Will Not Get From a Generic SOC Vendor
Managed XDR is human-led work. The operator behind the keyboard at 02:17 on a Saturday determines the value of the contract. Below is what we put on the engagement letter.
Engagement Discipline
- NC-based 24/7/365 SOCNo overseas Tier-1 triage farm. Every analyst is US-based and credentialed. Chain-of-custody and accountability stay clean for CMMC, HIPAA, and defense-contractor work.
- CMMC-RP credentialed leadsRPO #1449 across the firm. Every Tier-3 escalation is owned by a Registered Practitioner, not a contractor passing through.
- DFE-licensed IR leadFounder Craig Petronella holds DFE license #604180. The same firm that detects can produce court-admissible forensics if litigation, law enforcement, or regulator notification follows.
- MTTR target under 15 minutesCritical-alert SLA defines the time from detection to first containment action. Automated containment within seconds on confirmed indicators. Human review on any irreversible step.
- Quarterly tabletop includedOne scripted exercise per quarter, with a written after-action report. Satisfies CMMC IR.L2-3.6.3 and HIPAA contingency-plan testing at no additional cost.
Standards and Frameworks
- NIST SP 800-61 Revision 2Computer Security Incident Handling Guide. The four-phase model (preparation, detection and analysis, containment-eradication-recovery, post-incident) drives every Tier-3 escalation.
- MITRE ATT&CKAdversary tactic and technique tagging on every alert. Monthly coverage heatmap shows which techniques your stack detects and which it does not.
- NIST SP 800-171 Rev 2Control families 3.6 (Incident Response) and 3.14 (System and Information Integrity) pre-mapped in every monthly report.
- CIS Controls v8Implementation Group 2 and 3 expectations mapped to managed-service evidence streams. Auditor-ready.
- Petronella enterprise private AI clusterDetection engineering runs on Petronella's on-premises GPU-accelerated AI infrastructure. Client telemetry never crosses into a public cloud LLM for analysis. Data sovereignty is built in, not a setting that can be toggled.
A Real Lateral-Movement Detection, Walked Step by Step
Below is a representative scenario drawn from the kind of case that lands in a Petronella SOC queue. Times are sample illustrative values aligned with the under-15-minute MTTR target on critical alerts. Hostnames, ticket IDs, and specific commodity vendors are sample-illustrative.
The case above represents a containment under the 15-minute MTTR target with cross-domain correlation joining endpoint, identity, and network signals into one investigation. Without the correlation engine the same case is three separate alerts in three separate consoles, each looking like noise. With the correlation engine it is a single timeline the SOC analyst can walk in one minute.
Which Alerts and Playbooks Satisfy Which Framework
Every MXDR evidence stream is pre-mapped to the control catalog the auditor will use. The monthly executive summary is also the audit binder.
CMMC 2.0 IR Family
MXDR evidence maps to CMMC L2 practices IR.L2-3.6.1 (incident handling), IR.L2-3.6.2 (incident tracking and reporting to authorities), IR.L2-3.6.3 (incident response testing), and SI.L2-3.14.6 (system monitoring). Petronella is CMMC-AB RPO #1449. Reports format for direct C3PAO submission.
252.204-7012 Monitoring
NIST SP 800-171 Revision 2 control families 3.6 (Incident Response) and 3.14 (System and Information Integrity) require continuous monitoring and incident handling for any system processing Controlled Unclassified Information. MXDR evidence feeds the System Security Plan and the Plan of Action and Milestones in SPRS under DFARS 252.204-7019.
Security Rule 164.308(a)(6)
Security Incident Procedures at 45 CFR 164.308(a)(6) and Information System Activity Review at 164.308(a)(1)(ii)(D) are satisfied by MXDR's 24/7 monitoring, alerting, and case-management evidence. Business Associate Agreement on file for every healthcare client before any work begins.
Requirements 10 and 12.10
PCI DSS v4 Requirement 10 (log all access to network resources and cardholder data) and Requirement 12.10 (implement an incident response plan, test annually) are evidenced directly by MXDR case files, retained logs, and the quarterly tabletop after-action report. QSA-ready format.
Trust Services Criteria CC4 and CC7
SOC 2 CC4 (Monitoring Activities) and CC7 (System Operations) are evidenced by MXDR monthly reporting and case-management metrics. We coordinate scope directly with your CPA firm before the audit window opens so the evidence binder is ready on day one of fieldwork.
Underwriting Renewal Packet
Cyber insurance carriers require continuous monitoring, documented incident response, and tabletop testing for nearly every renewal questionnaire. MXDR generates the underwriting packet in the format brokers and underwriters expect. Saves the CFO hours per renewal cycle and frequently moves the premium.
Annex A.16 Incident Management
Annex A.16 of ISO 27001 (Information Security Incident Management) is best evidenced by a managed monitoring and response service. MXDR case files map directly to ISMS control records. We coordinate with your ISMS lead before the surveillance audit.
Controls 8, 13, 17
CIS Control 8 (Audit Log Management), Control 13 (Network Monitoring and Defense), and Control 17 (Incident Response Management) are all evidenced through MXDR monthly reporting. Implementation Group 2 and 3 maturity targets are achievable within a single quarter of onboarding.
NY-DFS, CCPA, NCGS 75-65
Reasonable-security obligations under state breach-notification statutes (NY-DFS 23 NYCRR 500, California Information Privacy Act, North Carolina General Statute 75-65, Massachusetts 201 CMR 17) are increasingly defined by case law as a documented detection-and-response program. MXDR produces the artifacts a state attorney general would apply during a post-breach review.
Verticals Where MXDR Earns Its Keep
Regulated verticals carry the majority of our MXDR work. The acronyms change. The scoping conversation does not.
Defense contractors and the Defense Industrial Base. CMMC 2.0 Level 2 and Level 3 require continuous monitoring and incident response evidence that a passive review will not produce. MXDR pre-maps every alert to the practice catalog, every monthly report to the SSP, and every quarterly tabletop to IR.L2-3.6.3. The defense supply chain attack surface is the highest-stakes work we do and the deliverable formats reflect that. See our engineering firms cybersecurity hub for the vertical narrative on the DIB-adjacent engineering practice.
Healthcare and HIPAA-regulated entities. Hospitals, clinics, dental practices, and Business Associates carry HIPAA Security Rule obligations under 45 CFR Part 164. The threat profile centers on ransomware against EHR systems, business email compromise targeting accounts-payable workflows, and credential abuse against remote-access portals. MXDR's 24/7 SOC and the IR retainer line item are usually the difference between a contained incident and a regulator notification. Petronella signs a Business Associate Agreement before any work begins. See HIPAA compliance services for the broader compliance wrap.
Financial services and accounting firms. Wealth managers, CPAs, registered investment advisors, and small banks operate under FFIEC, SEC, FINRA, and state-level supervisory expectations. Wire-fraud and business email compromise are the leading threat patterns, frequently joined with credential theft from cloud-hosted productivity suites. MXDR's email security and identity IDR domains correlate directly to those threat patterns. Cyber insurance underwriting for financial services has tightened materially since 2022 and MXDR evidence is one of the cleanest paths to a renewable policy.
Manufacturing, engineering, and architecture firms. Manufacturers and engineering firms hold the trade secrets, the CAD files, and the proprietary process documentation that nation-state and financially motivated actors specifically target. The OT and ICS adjacency adds a second attack surface that conventional IT detection rarely covers. MXDR with OT scoping closes the gap. Engineering firms with DoD or DIB contract exposure pull in the CMMC overlay as well.
Professional services and legal firms. Law firms hold privileged client data, financial wire authority, and frequent merger-acquisition-litigation intelligence. The attack pattern often centers on credential theft followed by business email compromise targeting partner-level wire approvals. MXDR's identity IDR and email security domains together catch the chain at the credential-abuse step before the wire goes out.
The First Thirty Days of a Petronella MXDR Engagement
Days one through five: scoping call, signed engagement letter, executed Master Services Agreement, executed Business Associate Agreement where HIPAA applies. Asset inventory exchange: endpoints, identities, cloud tenants, email tenants, and the specific tooling stack already in place. The objective is to remove ambiguity from the bill of materials before any agent is deployed.
Days six through twelve: telemetry connectors deployed and validated. EDR integration with whichever endpoint platform is in place. Identity provider connector to Active Directory, Entra ID, or Okta. Cloud tenant audit feeds connected to the correlation engine. Email tenant API connections to Microsoft 365 or Google Workspace. Each connector is validated end-to-end before the next one is wired in, so a misconfigured tenant does not silently produce zero telemetry for three weeks.
Days thirteen through twenty: baseline tuning. The correlation engine watches the environment for two weeks to establish behavioral baselines. Login patterns, authentication geographies, service-account activity windows, normal east-west flow volumes, expected outbound DNS cadence. Tuning runs in shadow mode so genuine alerts are still surfaced while false-positive thresholds adjust to your environment.
Days twenty-one through twenty-seven: live-cutover. Automated playbooks activate. The SOC begins active alerting against the tuned baseline. The named SOC point-of-contact and the escalation tree are confirmed in writing. The first weekly status review covers the tuning results, the open detection coverage gaps, and the IR retainer hour balance.
Days twenty-eight through thirty: first monthly executive summary lands. Tabletop scheduling kicks off for the upcoming quarter. Compliance evidence mapping is reviewed with the client's compliance lead or vCISO. The engagement is now in steady state and the relationship moves from onboarding cadence to operational cadence.
Most clients onboard in under thirty days. Larger environments with multi-tenant cloud footprints and OT scoping can run forty-five to sixty days. The engagement letter names the target. The weekly status review tracks variance against it.
Twenty-Four Plus Years on the Same North Carolina Street
Credentials are not the SOC. They are who you are letting inside your environment when the alert fires. Below is what is on the engagement letter.
Headquarters and SOC
Petronella Technology Group, Inc.5540 Centerview Drive, Suite 200
Raleigh, North Carolina 27606
Phone: (919) 348-4912
Hours: 24/7/365 Security Operations
Business hours: Mon-Fri 8:00 AM - 6:00 PM ET
Service area: North Carolina + nationwide via secure remote infrastructure
Credentials on the Engagement Letter
CMMC-AB RPO #1449. Every engineer is CMMC-RP credentialed.
DFE License #604180. Founder Craig Petronella holds a state-issued Digital Forensics Examiner credential.
CCNA + CWNE. Cisco Certified Network Associate plus Certified Wireless Network Expert.
BBB A+ since 2003. Continuously rated A+ for over two decades.
Founded 2002. Twenty-four plus years of NC-based security operations.
Managed XDR Questions Decision-Makers Ask
Selected from scoping calls with CFOs, CISOs, IT directors, and compliance officers across the Triangle, North Carolina, and nationally.
What is the difference between EDR, MDR, and XDR?
Do you actually have a 24/7 human SOC?
Where are your SOC analysts located?
What is your mean-time-to-respond commitment?
Do you handle the incident response end-to-end or just the detection?
How does Managed XDR satisfy CMMC and HIPAA?
Do you offer a retainer model?
What does Managed XDR cost?
Can we keep our existing EDR or do we have to switch?
Do you run tabletop exercises?
Pair Managed XDR With
MXDR is most valuable as part of a security program. These pages cover the work that wraps around it.
This page is the MXDR service deep-dive. For the bundled stack angle - how endpoint EDR, network NDR, identity IDR, cloud CDR, and email security are packaged and priced as one suite with the SOC retainer wrapped in - see the Managed XDR Suite bundled stack page.
Managed XDR Suite (bundled stack)
Cybersecurity Pillar Hub
Managed IT Services
Managed IT Raleigh NC
Penetration Testing
Digital Forensics
HIPAA Compliance
CMMC Compliance
Cybersecurity Wilmington NC
vCISO Services
Incident Response
Managed SIEM
Managed Detection & Response
Endpoint Detection & Response (EDR)
Cloud Security Posture Management (CSPM)
Scope Your Managed XDR Engagement
Free 30-minute scoping call. A Petronella engineer walks the environment, names the controls the deliverable will map to, and produces a fixed-fee engagement letter inside three business days.