New 100% open-source managed SOC

Enterprise-grade SOC. Without enterprise licensing.

NullNetwork delivers 24×7 managed detection & response built on Wazuh, TheHive, Cortex, MISP and n8n. You pay only for our analysts watching your environment, never for the tools. Onboarded in 30 days.

30-day deployment
24×7 monitoring
ISO 27001 aligned
soc.nullnetwork.in / overview Live
Alerts · last 24h Live
1,284+12%
412 escalated · 9 critical
Live feed Live
  • PowerShell encoded payload on DC-01
  • Brute-force burst, blocked at edge
  • New device joined VPN · verified
MTTR
42s
Containment
99.6%
Uptime
99.95%

Trusted by security teams across India

1,200+
Endpoints under active monitoring
4,800/mo
Alerts triaged by certified analysts
42s
Median time-to-contain
99.95%
SOC platform uptime, last 12 months
Solutions

Two ways NullNetwork protects your business.

A fully managed SOC for defence, or an offensive security review to find gaps before attackers do. One team, one accountable partner, transparent pricing.

Blue team · managed

Managed SOC

24×7 detection, triage and response, run by our certified analysts on a stack we deploy and tune for you. Alerts reach you on WhatsApp, not buried in a dashboard.

  • Wazuh agents on every endpoint & server
  • TheHive case mgmt with strict SLAs
  • n8n SOAR playbooks for auto-containment
  • Monthly exec report + quarterly review
Request a quote
Red team · project

VAPT & Pen Testing

Hands-on network and application penetration testing, led by OSCP / CRTP consultants. PTES methodology, manual exploitation, plain-English remediation steps.

  • Network, web app & Active Directory
  • Proof-of-exploit for every High/Critical
  • Free retest cycle within 30 days
  • Letter of Attestation for auditors
Request a quote
The Platform

Five best-in-class tools.
Zero license fees passed to you.

Every tool we run is genuinely open source, not "community edition" with the useful features paywalled. You can audit our stack on GitHub, fork it, or take it in-house tomorrow.

Wazuh SIEM · XDR
01 Detect

Agents on every endpoint and server collect logs, FIM events, vulnerabilities and process telemetry. Rules mapped to MITRE ATT&CK.

Open source wazuh.com ↗
MISP Threat Intel
02 Enrich

Every IOC checked against curated feeds, sector-specific ISACs, and global open-source threat intel. Real threats surface; noise gets filtered.

Open source misp-project.org ↗
TheHive Case Management
03 Triage

Each validated alert becomes a tracked case with owner, severity, evidence and SLA. Nothing slips through, you see exactly what we did and when.

Cortex Analysis Engine
04 Investigate

100+ analyzers run automatically on every observable: VirusTotal, AbuseIPDB, hybrid-analysis, hash lookups, sandbox detonation. Verdicts in seconds.

Open source github.com ↗
n8n SOAR Automation
05 Respond

Playbooks auto-isolate compromised hosts, block IPs at the firewall, disable accounts, ticket your team, and ping you on WhatsApp, in seconds.

Open source n8n.io ↗
Your stack Native integrations
06 Integrate

We plug into your existing infrastructure, AWS, Azure, GCP, Fortinet, Palo Alto, Microsoft 365, Google Workspace, AD & Entra ID, Jira, Slack, WhatsApp.

200+ integrations Ask about yours →

Bottom line: Commercial SIEMs start at ₹18–40 lakh/year in licensing alone. Our customers spend ₹0 on tools, only on the team that runs them.

See cost comparison
Our Process

Zero to fully monitored in 30 days.

No 6-month implementation phase with consultants billing daily. We deploy fast because we've done this before, and because the stack is built for it.

Step 01

Scope & sign

30-minute call to understand your environment, endpoint count, existing tools. MNDA signed before anything technical starts.

Day 0
Step 02

Deploy & onboard

We stand up your Wazuh, TheHive, Cortex and MISP (cloud or on-prem). Agents go out, log sources wired in, baseline policies applied.

Day 1–7
Step 03

Tune & learn

We tune detection rules, kill false positives, model normal behaviour, build n8n response playbooks. WhatsApp alert channel goes live.

Day 8–21
Step 04

Go live · 24×7

Full 24×7 monitoring active. First monthly report delivered. Quarterly review cadence scheduled. You can sleep through the night.

Day 22–30
Why NullNetwork

Six reasons we win the bake-off.

We're not the cheapest MSSP in India and we're not the biggest. We're the one you can verify, that talks to you on WhatsApp, and that doesn't pad invoices with license markups.

Transparent open-source stack

Every tool is on GitHub. No black-box agents, no proprietary collectors, no surprise license renewals. Audit, fork, or migrate out, we earn the relationship every month.

WhatsApp-native alerting

Critical alerts arrive where you already look, on your phone, in WhatsApp, in plain English with one-tap approve/deny. No dashboard logins, no email-to-spam losses.

Consultant-led, not ticket-mill

Every customer gets a named lead analyst. OSCP, CEH and CRTP certified humans look at your alerts, not an offshore L1 reading from a script.

Hybrid red + blue team

We pentest the same environments we defend. SOC analysts know how attackers move because half of them did exactly that last week. Detection informed by real offense.

Built for India

Pricing in INR. DPDP Act ready. Onboarding in English, Hindi or Tamil. Local context global MSSPs don't bother with.

Fast on the trigger

Median time-to-contain on critical alerts is 42 seconds, because automation does the boring 90%, analysts only step in for the judgement calls.

Leadership

A small team. Senior on every call.

No layered hierarchy. The people you meet in the sales call are the same ones who will defend your network at 3 a.m. on a Saturday.

Naveen Rajan
Founder · Principal Consultant

10+ years across offensive and defensive security. Led red-team engagements for BFSI and SaaS clients across India and SEA.

OSCP · CRTP
Lead SOC Analyst
Detection Engineering

Architects detection rules across the Wazuh + Sigma ecosystem. Built threat-hunt playbooks now used across all client environments.

CEH · GCIH
Lead Pen Tester
Red Team Operations

Specialises in Active Directory and cloud attack-path analysis. Reports broken into "fix this Friday" and "fix next quarter" buckets.

OSCP · CRTP

We migrated off a global MSSP and our detection coverage actually went up. Same MITRE coverage, alerts that finally make sense, and we got most of a year of license fees back to put into engineering.

Head of Information Security · Mid-sized BFSI firm

Recognition & alignment

ISO 27001
Aligned
SOC 2
Type II ready
MITRE ATT&CK
Mapped
NIST CSF 2.0
Framework
DPDP Act
2023 ready
FAQ

Questions buyers actually ask.

If yours isn't here, ask us on WhatsApp.

Why open source instead of Splunk, Sentinel or QRadar?

The open-source stack is genuinely as good, Wazuh, TheHive, Cortex and MISP are used by Fortune 500 SOCs and national CERTs. The difference is licensing: a mid-size deployment of Splunk or Sentinel can cost ₹18–40 lakh per year before you hire a single analyst. We pass that saving directly to you and put it into more analyst hours instead.

Is open source really enterprise-grade?

Wazuh monitors 15+ million endpoints globally. MISP is used by NATO, CERT-EU and dozens of national CERTs. TheHive and Cortex are operated by some of the largest banks in Europe. "Open source" stopped meaning "amateur" a decade ago in this space.

Where does my data live?

Your choice. We deploy on your cloud account (AWS / Azure / GCP), your on-prem infrastructure, or our managed India-region cloud. Your logs and case data never leave the deployment you control. We sign a DPDP-aligned data processing addendum.

How is this priced?

Per endpoint, per month, in INR, with no separate line items for "tool licenses" because there aren't any. Pricing scales with endpoint count and required SLA. Send us your endpoint count on WhatsApp and we'll come back with a quote within one working day.

What happens if we want to leave?

You keep everything. The Wazuh, TheHive, Cortex and MISP instances are yours, we hand over admin credentials and walk your team through operating it. No proprietary lock-in, because there is no proprietary configuration. 30 days notice and we're done.

How fast can we go live?

Standard onboarding is 30 days from contract signature to full 24×7 coverage. For environments under 200 endpoints with cloud-native log sources we have gone live in 14 days. We won't cut corners on tuning, a noisy SOC is worse than no SOC.

Get started

Ready to retire your dashboard logins?

A 30-minute call. We listen to your environment, walk you through how our SOC would run for you, and send a written proposal within 48 hours. No slide decks, no sales engineers, no follow-up spam.

Contact

Talk to a real person.

Use any channel below. We reply within one business day, usually within an hour during IST business hours.