MSSP Case Study: Education Institute Secures Campus with 24/7 SOC Service

About the Customer

The client is a prominent international educational institution. Their campus network supports thousands of students and staff, managing a high volume of sensitive personal data and critical operational systems.

MSSP Case Study Table 1
Category Details
Industry Education
Challenge Gaining 24/7/365 visibility into internal network activity, identifying anomalous user behavior, and detecting potential insider or external threats before they escalate.
Solutions Used 24/7 i-SOC, Managed Security Service (MSSP), SIEM & Managed Detection & Response (MDR)

The Challenge

The client's internal IT team faced a significant challenge in monitoring their complex network 24/7. Without a dedicated Security Operations Center (SOC), they had limited visibility into real-time network traffic and user behavior. This "black box" environment meant that:

  • Anomalous activity, such as unusual logins or access patterns, could go undetected for long periods.

  • Potential insider threats, whether accidental or malicious, posed a significant risk to sensitive student and financial data.

  • Misconfigured systems or services could create security gaps or generate high volumes of "noise," making it impossible to identify genuine threats.

  • Escalation of a minor issue into a major breach was a primary concern, as the IT team lacked the 24/7 resources to triage every alert.


The AKATI Sekurity Solution

The institution partnered with AKATI Sekurity to deploy our 24/7/365 i-SOC MSSP service. This engagement provided an immediate, expert-led Managed Detection and Response (MDR) capability.

Our i-SOC team onboarded the school's critical log sources, including network devices and endpoints, into our advanced SIEM platform. This enabled our SOC analysts to provide Level 1 monitoring, researching, and triaging all events. Instead of just forwarding raw alerts, our i-SOC acts as a filter, escalating only validated, actionable anomalies to the client's IT team with clear, concise remedial instructions.

Quarterly Threat & Triage Summary

Our SOC's primary function is to analyze all events and classify them against the Cyber Kill Chain. This ensures that genuine threats are prioritized and non-critical "noise" is handled appropriately. Throughout the quarter, all detected events were successfully triaged, with zero critical incidents or breaches identified.

The monitoring successfully identified and neutralized numerous non-critical anomalies, primarily in the "Persistent Foothold" and "Propagation" stages, allowing the client to fix hygiene issues before they could be exploited.


Cyber Kill Chain Alert Summary

Cyber Kill Chain Alert Summary
Initial Attempts
Dozens of Events
Persistent Foothold
Hundreds of Events
Exploration
Few Events
Propagation
Dozens of Events
Exfiltration & Impact
0
Initial Attempts
Persistent Foothold
Exploration
Propagation
No Critical Events

Monthly Triage & Escalation Metrics

The following metrics represent the anonymized, vague summary of our i-SOC's activity over a single quarter, demonstrating the high volume of analysis performed to deliver high-fidelity, actionable alerts.

MSSP Case Study Table 2
Reporting Period Total Events Analyzed Non-Critical Anomalies Triaged Critical Incidents Escalated
Month 1 (July) > 75,000 Dozens 0
Month 2 (August) > 100,000 Dozens 0
Month 3 (Sept) > 80,000 Dozens 0

Discovery: Sample Proactive Detections

The true value of the MSSP service is in detecting and providing context for anomalies that automated systems alone would miss. Our SOC team identified, researched, and escalated numerous events for client-side validation.

MSSP Case Study Table 3
Anomaly Category Description & Findings SOC Analyst Recommendations
User Asset Access Anomaly Detected multiple instances of user accounts accessing internal servers and assets after long dormancy periods (e.g., 20-60+ days). This behavior deviates from normal patterns and could signify unauthorized access. SOC analysts escalated findings to client IT team for validation of dormant account activity. Recommended immediate verification of user access rights and correlation with current role assignments to mitigate potential unauthorized access risk.
Internal Login Failure Anomaly Identified high-volume failed login attempts (e.g., 90+ attempts in one period) from a single internal account. This indicated a high probability of a misconfigured service or script with hardcoded, expired credentials. SOC identified credential-based authentication failure patterns consistent with service account misconfiguration. Recommended audit of automated processes and service accounts to remediate hardcoded credentials, preventing account lockout and reducing false-positive alert volume.
Password Reset Anomaly Flagged unusual patterns of password resets (e.g., 10-15 resets in 24h) by both user and system accounts. This anomalous behavior required validation to rule out privilege misuse or automation errors. SOC flagged high-frequency password reset activity for security review. Recommended validation of account management processes and implementation of password reset controls to prevent potential privilege escalation or automated system errors.
Sensor Status Anomaly Proactively monitored the health of data ingestion sensors, noting minor, periodic disconnections. This allowed for network troubleshooting before it could lead to a visibility gap. SOC proactively monitored telemetry health and identified intermittent sensor connectivity issues. Provided detailed logging data to support network infrastructure investigation, ensuring continuous security monitoring coverage and preventing detection blind spots.

Conclusion

Visibility is the foundation of effective security. AKATI Sekurity's i-SOC MSSP engagement transformed the client's security posture from reactive to proactive, providing 24/7 expert oversight. By analyzing thousands of events to identify and escalate only the most relevant anomalies, our i-SOC frees the institution's internal IT team from alert fatigue. This allows them to focus their limited resources on validated tasks, dramatically improving cyber hygiene and ensuring the campus network remains secure.


Next
Next

Phishing Case Study: How A Leading Conglomerate Is Building A Human Firewall