Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Detection
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
Sovereign SOC
A sovereign SOC offering operated 24/7, deployable from our marketplace, on SecNumCloud-qualified infrastructure.
Protection
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
Security

Sovereign SOC

Outsource the detection, qualification and response to security incidents. A sovereign SOC offering operated 24/7, deployable from our marketplace, on SecNumCloud-qualified infrastructure.

The fundamentals of the Sovereign SOC offer

The service Sovereign SOC (Security Operations Center) is a security incident monitoring, detection and response service operated 24/7 by Cloud Temple analysts.

In addition to our SIEM, which collects and technically correlates the logs, the Sovereign SOC provides the human capacity essential to the complete cyber defence cycle: alert qualification, investigation, remediation recommendations and incident response coordination.

The entire service is backed up by the operational experience of our teams, who supervise the Cloud Temple cloud platform on a daily basis - a SecNumCloud-qualified infrastructure housing the most sensitive data of our public and private customers. What we do for our cloud, we now do for yours.

Our compliance procedures

Our Sovereign SOC offer is backed up by leading qualifications and certifications.

We are aiming for PAMS qualifications in 2026 and PDIS in 2027.

24/7

Continuous supervision

1h

Intervention SLA

100%

Hosted in France SecNumCloud

The benefits of Cloud Temple's Sovereign SOC offering

Continuous monitoring

24/7 detection, reduced MTTD

A team of analysts permanently mobilised to detect, qualify and react to threats. Drastic reduction in mean time to detect (MTTD) and mean time to respond (MTTR).

End-to-end control

From SIEM to CERT, without intermediaries

Cloud Temple operates the entire chain: SecNumCloud infrastructure, SIEM platform, SOC team, response capacity. No vendor dependency, no link we don't control.

Sovereign compliance

French hosting, regulatory traceability

Logs, traces, alerts and investigations hosted in France on our SecNumCloud-qualified cloud. Compliance with NIS2, DORA, RGPD and HDS requirements.

AI-enhanced detection

LLM + MITRE ATT&CK

Our correlation engine uses MITRE ATT&CK rules and Artificial Intelligence to pre-qualify alerts and focus analysts' work on the real threats.

Linear pricing

No threshold effect, predictable OPEX model

Clear subscription basis + invoicing by units of work (volume, use cases). You can adjust your scope without a sudden price jump. Public prices displayed, like all our products.

The key features of our Sovereign SOC

24/7 supervision
Team of L1, L2 and L3 analysts permanently on call to monitor and react.

Alert qualification
Sorting, qualifying and investigating events reported by the SIEM, with business contextualisation.

Incident response
Coordination of response, containment recommendations, support for remediation.

Threat intelligence
Active threat monitoring, integration of IOC feeds and correlation with your supervised perimeter.

Threat hunting
Proactive search for dormant threats or abnormal behaviour not detected by the rules.

Customised use cases
Adapt detection rules to your business environment and specific use cases.

Reporting & governance
Periodic activity reports, MTTD/MTTR indicators, recurring steering committees.

Real-time customer portal
Full visibility of alerts in progress, investigations, history and indicators.

Technical specifications

Sovereign SOC
Cover 24/7/365 - French-speaking analysts
SLA qualification <1h on critical alert
Detection catalogue MITRE ATT&CK rules + customised use cases
Underlying platform Managed SIEM Cloud Temple (HDS, ISO 27001)
Hosting Cloud Temple SecNumCloud - France
Hot / cold retention 90 days / up to 1 year (optional)

Our public rates

A linear pricing scale, with no threshold effect and no penalising bands. You subscribe to an SOC service level that defines the depth of expertise and the SLAs, then you pay for the technical resources consumed on a pay-as-you-go basis (GB/day volume).

RUN - Fixed monthly packages
Pricing table detailing the different options and features of the services offered.
Description Unit Unit price € excl. Commitment
SOC Core - Data in France, MTTI 1h 24/7, quarterly committee monthly subscription 2100 € 12 months
SOC France - Data and operation 100% in France, equitable analysts, MTTI 1h 24/7, quarterly committee monthly subscription 2900 € 12 months
Premium option - continuous threat hunting, annual intrusion test. Can be combined with Core or France monthly subscription 1350 € 12 months
SOC Core - monthly rate calculated on the average daily volume of logs ingested *. average volume GB / day 28 € 1 month
SOC France - monthly rate calculated on the basis of the average daily volume of logs ingested *. average volume GB / day 38 € 1 month
BUILD - One-off packages
Pricing table detailing the different options and features of the services offered.
Description Unit Unit price € excl. Commitment
Build SOC Core - Standard sources and detection rules, marketplace deployment, up to 30 sources project 4500 € one-off
Build SOC France - Sources, detection rules, hardening, sovereign deployment project 6500 € one-off
Build option Premium - Additional integrations (red team baseline, advanced playbooks) project 3000 € one-off
À LA CARTE OPTIONS - Fixed, orderable prices
Pricing table detailing the different options and features of the services offered.
Description Unit Unit price € excl. Commitment
Customised detection rule - Monthly creation and maintenance use cases 135 € 1 month
Dark web surveillance - Identifier leakage monitoring domain 200 € 12 months
Cold storage - Extension to 1 year (beyond the 90 days hot included) Go ingested 0,15 € 12 months
Cold storage - Extension to 7 years (regulated sectors) Go ingested 0,42 € 36 months
Vulnerability scan - 8 public IPs, report delivered scan 120 € to order
Additional SOC Committee session 950 € to order
SERVICES ON ESTIMATE - Tailor-made
Pricing table detailing the different options and features of the services offered.
Description Unit Pricing Commitment
CERT PRIS - Incident response subscription, includes 4 days of digital investigation annual On request 12 months
Forensic / Digital investigation - Post-incident analysis day On request per service
Red team / Purple team - Annual exercise financial year On request per service
Security posture audit and detection strategy alignment service On request per service
Migration from an existing SIEM - Reuse and audit of rules project On request one-off
SIEM engineering - Collection and detection of non-standard sources day On request per day

* Examples of pricing

SOC Core :

Scenario: Monthly subscription €2,100 + average daily volume 10 GB

Calculation: €28 × 10 GB = €280, i.e. €2,380 / month

SOC France :

Scenario: €2900 monthly subscription + 10 GB average daily volume

Calculation: €38 × 10 GB = €380, i.e. €3,280 / month

Do you have a sovereign SOC project or a project to strengthen your cyber defence?

Would you like to outsource your security supervision, comply with NIS2 and DORA, or benefit from a 24/7 team of analysts on a sovereign infrastructure?

Our experts will work with you to define your monitoring perimeter, define your priority use cases and size the solution to meet your needs. Tell us about your project and we'll get back to you as soon as possible.

Merci de confirmer que vous n’êtes pas un robot
I consent to Cloud Temple storing and processing the personal information submitted above in order to respond accurately to my request. * mandatory fields

Use cases

Photo of a Kafka manage environment
NIS 2 compliance for an industrial SME

BACKGROUND

An industrial company entering the NIS2 perimeter must demonstrate its ability to detect and notify incidents within 24 hours, without having an internal SOC team.

 

SOLUTION

Deployment of Sovereign SOC at Core level to complement the existing Managed SIEM. 24/7 coverage, implementation of priority NIS2 use cases, documented notification process.

 

PROFIT

Demonstrable NIS2 compliance, ability to react immediately, freeing internal IT teams from the constraints of operational monitoring.

Health research
Detection of post-compromission lateral movements

BACKGROUND

A healthcare establishment suspects a compromise and wishes to identify any abnormal activity on its Active Directory and critical servers.

 

SOLUTION

Activation of dedicated MITRE ATT&CK rules (elevation of privileges, abnormal access), threat hunting targeted by L3 analysts, correlation with Cloud Temple threat intelligence feeds.

 

PROFIT

Rapid identification of indicators of compromise, immediate containment recommendations, reduction in the time the attacker is present in the information system.

flag of europe
Sovereign SOC for an essential operator

BACKGROUND

An essential operator (OSE) must entrust its supervision to a qualified service provider, on an infrastructure that is immune to extraterritorial laws, with a PDIS qualification trajectory.

 

SOLUTION

Deployment of the Sovereign SOC in France on Cloud Temple's SecNumCloud-qualified cloud. Strict partitioning, empowered teams.

 

PROFIT

Guaranteed end-to-end sovereignty, early regulatory compliance, alignment with the most stringent ANSSI requirements for incident detection and response.

Frequently asked questions

The SIEM is the tool, the SOC is the team.

Our Managed SIEM collects, standardises and correlates security logs, and raises technical alerts qualified by our AI. The Sovereign SOC adds the indispensable human dimension: our 24/7 analysts qualify alerts in a business context, conduct investigations, recommend remedial actions and coordinate the response to incidents. The two services are complementary.

Target 2027, in line with our ANSSI approach.

Cloud Temple has been SecNumCloud qualified since 2022 (IaaS) and 2024 (PaaS). Our Sovereign SOC has been designed from the outset to meet the requirements of the PDIS (Security Incident Detection Service Provider) standard. Qualification is targeted for 2027.

Your Temple Cloud infrastructures, but also your external environments.

The Sovereign SOC natively supervises all the Temple Cloud services you have subscribed to. It also extends to your external environments: on-premises datacentres, other public clouds (AWS, Azure, GCP), SaaS (M365, Workspace), network equipment and business applications. Data collection is secured via IPsec or TLS 1.3 VPN tunnels.

We offer real-time detection with an analyst qualification time of 1 hour 24/7.

Immediate mobilisation and coordination of the response.

In the event of a major incident (suspected compromise, ransomware, exfiltration), our L3 analysts are mobilised immediately. A crisis unit is set up with your teams, containment recommendations are issued, and remediation support is provided. Forensic investigation costs extended beyond the scope of the contract are invoiced in man-days.

Your data and settings remain your property.

In compliance with the Data Act, reversibility is guaranteed. You can request an export of all your logs, detection rules, customised use cases and investigation history in standard market formats at any time. The process is free, carried out under a 30-day SLA, followed by a secure purge of your environments within 7 days.

Can't find the answer to your question?
Contact our teams
Contact us
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.