Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Calcul offer
Dedicated servers
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Containers
Openshift PaaS
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Bare Metal
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
IA
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the IA offer
IA
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
Security

Managed SIEM

A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).

The fundamentals of the Managed SIEM offering

The service Managed SIEM (Security Information and Event Management) is a managed solution for centralising and analysing security events on your information systems.

Designed to equip your security teams or your SOC, this service is based on a powerful hybrid architecture: centralised collection of very large-scale logs, coupled with a real-time correlation engine and enhancement using Artificial Intelligence (LLM). This approach makes it possible to filter out operational noise and raise highly qualified alerts, all on a sovereign infrastructure that guarantees the legal conservation of your traces.

Our compliance procedures

Our Managed SIEM offering is HDS and ISO 27 001 certified

The benefits of Cloud Temple's Managed SIEM offering

Simplified supervision

Focus on investigation, zero Ops
Free your teams from technical constraints with a fully deployed, maintained and updated SIEM, so they can concentrate solely on analysing and responding to incidents.

Sovereign compliance

Secure hosting in France
Guarantee the integrity and compliance of your logs by hosting them on a SecNumCloud-qualified cloud, adapted to regulatory requirements and audits.

Controlled budget

Predictable OPEX model
Anticipate your costs with clear pricing based on the volume of data ingested, without the complexity of licences or infrastructure investment.

Key features of our Managed SIEM

Multi-source collection
Log management from multiple sources (OS, networks, firewalls, applications).

Correlation engine
Detection based on a catalogue of standard rules aligned with the MITRE ATT&CK framework.

AI enrichment (LLM)
Automated qualification of technical alerts to assist the customer analyst.

Visualisation & Search
Advanced search interface and creation of customised dashboards.

Logical Isolation
Strict partitioning of data by customer (dedicated Index Sets/Streams).

Technical specifications

Managed SIEM
Hot retention 90 days (standard)
Cold retention Up to 1 year (optional)
Encryption AES-256 (Rest) / TLS 1.3 (Transit)
Detection framework MITRE ATT&CK

Do you have a project to centralise your logs or strengthen your supervision? Let's talk.

Do you want to equip your SOC teams, comply with traceability requirements (LPM, RGPD) or deploy a sovereign SIEM capable of effectively filtering operational “noise” using AI? Our experts can help you define your data collection perimeter, define your log sources and size the technical solution.

Share some information about your project with us using this form: we'll get back to you as soon as possible to design the solution that's right for your security needs.

Merci de confirmer que vous n’êtes pas un robot
I consent to Cloud Temple storing and processing the personal information submitted above in order to respond accurately to my request. * mandatory fields

Use cases

Cloud Temple's sovereign Managed SIEM product for lateral movement detection

Lateral movement detection

Context :
An organisation wants to detect advanced attacks in which an attacker discreetly moves around the information system after an initial compromise.

Solution:
Implementation of a Managed SIEM incorporating rules based on the MITRE framework, capable of correlating an elevation of privileges with abnormal access to several servers.

Profit :
Proactive detection of complex attacks, with consolidated, qualified alerts that make it easier for security teams to react.

Cloud Temple's sovereign Managed SIEM product for ransomware detection

Ransomware detection

Context :
Businesses need to protect themselves against ransomware attacks, which can lead to massive data encryption and business downtime.

Solution:
Use of a Managed SIEM with a correlation engine capable of identifying massive file modifications and generating critical alerts in real time.

Profit :
Immediate reaction to attacks, limiting the impact and enabling rapid intervention by security teams.

Frequently asked questions

Sovereignty combined with Artificial Intelligence. 

Cloud Temple's Managed SIEM frees you from infrastructure management (“Zero Ops”). We combine a real-time correlation engine (based on the MITRE ATT&CK framework) with a layer of Artificial Intelligence (LLM). This AI pre-qualifies alerts and eliminates obvious false positives before notifying your teams, all hosted in France on a SecNumCloud-qualified cloud.

No, the tool focuses on technical detection. 

The standard scope of our Managed SIEM covers centralised log collection, technical correlation (Pattern Matching) and AI pre-qualification. In its standard version, the service does not include active and automatic response (SOAR) or advanced behavioural analysis (UEBA) functionalities.

90 days hot, extendable for your compliance. 

By default, our retention policy provides for “hot” retention of your security events for 90 days to enable your analysts to carry out rapid searches. To meet your regulatory constraints (RGPD, ISO 27001, LPM), we also offer a “cold” retention option (on Object Storage) of up to one year.

A predictable OPEX model with no complex licensing costs. 

Invoicing is split into two clear parts: a fixed base subscription (which covers access to the highly available platform and MITRE rule updates) and a variable part based solely on your average daily volume of ingested logs (invoiced on a Go-Day basis). The initial integration fee (Build) is fixed.

Strict partitioning and end-to-end encryption. 

Your data benefits from strong logical isolation: each customer has dedicated Index Sets and Streams. During transport from your infrastructures, data flows are secured (VPN IPsec or TLS 1.3 tunnel). Once hosted, all security data is encrypted at rest using the robust AES-256 standard.

Your data remains your exclusive property. 

In accordance with the Data Act, reversibility is guaranteed. If you wish to terminate the service, you can request an export of all your logs in standard market formats (syslog, JSON). This process is entirely free of charge and is carried out with a 30-day SLA, followed by a secure purge of your environments within 7 days.

Can't find the answer to your question?
Contact our teams
Contact us
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.