How it works
Three steps from connection to covered.
Connect your existing security tools in minutes, let AI triage every alert, and have your analyst team focus only on threats that actually matter.
Connect your tools
SentinelOne, Adlumin, and Trustify connect via API in approximately 15 minutes per tenant. No agents to deploy, no data migration required.
AI triages and correlates
A GPT-4-class model scores every alert, suppresses false positives, and correlates signals across all three sources. A single phishing email that dropped malware and triggered an EDR alert becomes one correlated incident, not three separate tickets.
Human-in-the-loop escalation
Only CRITICAL and confirmed threats reach your analyst team. Every escalation includes an AI-drafted ticket with the correlated evidence, suggested playbook, and recommended next action — so your team acts in seconds, not minutes.
Core Capabilities
Every layer your SOC needs, without the headcount.
Four purpose-built modules that work together as a unified triage and response layer across your entire client portfolio.
Alert Correlation
Cross-source correlation across EDR, MDR, and email security. Sentinel connects signals from SentinelOne endpoint telemetry, Adlumin behavioral detections, and Trustify email threats into unified incidents. Alert fatigue drops because your team sees incidents, not noise.
AI Triage
A GPT-4-class model scores every alert for severity, maps it to the MITRE ATT&CK framework, suggests the appropriate response playbook, and drafts the ticket — all before a human analyst sees it. Mean time to triage drops from hours to under 60 seconds.
Playbook Executor
For confirmed CRITICAL threats, Sentinel can execute automated response actions: isolate a host via SentinelOne, block a sender domain via Trustify, or trigger a password reset for a compromised account. Every automated action is logged with a full audit trail and requires analyst approval by default.
Tenant Dashboard
A per-client SOC view with SLA tracking, mean time to respond (MTTR) metrics, alert volume trends, and false-positive suppression rates. Each tenant sees only their data. MSP owners get a portfolio-level roll-up across all managed environments in a single pane.
Pricing
Per-tenant pricing that scales with your portfolio.
Add SOC Sentinel to any client tenant in minutes. No platform fees, no per-analyst seats. Pay only for the tenants you manage.
Sentinel Starter
Starter
Up to 100 endpoints. Email and EDR correlation.
- Up to 100 endpoints per tenant
- SentinelOne EDR + Trustify email integration
- AI alert scoring and false-positive suppression
- Per-tenant SOC dashboard
- CRITICAL-only analyst escalation
Sentinel Pro
Pro
Unlimited endpoints. Full EDR + MDR + email stack with AI Playbook Executor.
- Unlimited endpoints per tenant
- SentinelOne + Adlumin MDR + Trustify email
- AI Triage with MITRE ATT&CK mapping
- Playbook Executor — isolate, block, reset
- MTTR and SLA tracking dashboard
- Portfolio roll-up across all tenants
Enterprise
Custom
Dedicated analyst, SLA guarantee, and custom integrations.
- Everything in Sentinel Pro
- Dedicated analyst on your account
- Contractual SLA guarantee
- Custom integrations beyond the core stack
- Quarterly executive security briefings
For mid-market security teams: Deploy SOC Sentinel self-serve with Starter ($2K/mo) or Professional ($5K/mo) plans. Start in minutes, upgrade anytime. Start with Stripe →
Why AiT SOC Sentinel
AI triage at $299 per tenant versus an L1 analyst at $8,000 per month.
Hiring L1 analysts does not scale across an MSP client portfolio. SOC Sentinel gives you 24/7 coverage at a cost that makes per-tenant economics work.
| Feature | L1 Analyst Hire | AiT SOC Sentinel |
|---|---|---|
| 24/7 coverage | 8-hour shifts only | Always on |
| Cross-tool alert correlation | Manual, tool by tool | Automated across EDR, MDR, email |
| False-positive suppression | Manual review per alert | AI-scored, suppressed at ingestion |
| MITRE ATT&CK mapping | Analyst judgment required | Automatic on every alert |
| Automated response actions | Manual execution | Playbook Executor (Pro and above) |
| Monthly cost | $8,000+ salary per analyst | $299 per client tenant |
| Scales to N tenants | Requires additional hires | Same cost per tenant, any portfolio size |
Ready to reduce alert fatigue?
Thirty minutes with our team. We walk your current security stack and show you exactly what SOC Sentinel looks like across your client portfolio.
Page as of 2026-05-12. Pricing reflects current AiT SOC Sentinel reference tiers; final scope confirmed in discovery. Manuel Ruiz, Founder / CEO / CISO. © Intelligent Group (DBA Intelligent iT) · intelligentit.io