With increased digitization came greater dependency on IT and OT systems, and with the European NIS2 directive and the new Czech Cybersecurity Act (ZoKB), management quickly realized that a firewall and antivirus alone were no longer enough.
This challenge was particularly evident in a manufacturing company from the South Bohemian Region that experienced rapid growth, adding dozens of new employees and expanding its production plan with additional CNC (Computer Numerical Control) machines.
The South Bohemian manufacturer needed more than passive event logging or periodic access checks. Regulations required continuous monitoring, immediate response, structured reporting, and demonstrable evidence of security actions.
However, the internal IT team, focused on daily operations, lacked the capacity to run a comprehensive cybersecurity monitoring and response framework. Traditional solutions on the market, like Security Operations Center (SOC) offer, also proved unsuitable as costs grew disproportionately, based on log volume, users, or devices, making budgeting nearly impossible.
Axians proposed a SOC-as-a-Service solution, delivering comprehensive monitoring and incident response without hidden licensing fees. The system was deployed directly in the customers’ environment, ensuring all sensitive data remained within their own network and in compliance with legislation.
The implementation followed four steps:
- Infrastructure analysis and identification of key log sources.
- Rapid installation of collectors across servers, switches, endpoints, and cloud services.
- Fine-tuning of detection rules with the customer’s IT team to ensure relevant alerts and minimize false positives.
- Full-scale monitoring and monthly reviews, with Axians analysts providing expert insights, incident reports, and recommendations.
Axians security analysts continuously evaluated events, applied updated threat intelligence, and delivered immediate incident response when necessary.
Within the first week of operation, the organization detected critical issues such as incorrect access rights, outdated software with vulnerabilities, and attempted unauthorized logins. This allowed the IT team to act immediately by implementing patch management, stronger authentication, and configuration corrections.
We now see security based on data, not on paper. The Axians SOC-as-a-service solution immediately showed us where the biggest weaknesses were, and we put together a clear plan to eliminate them. Previously, we dealt with problems ad hoc, now we have a comprehensive analysis that guides us step by step from risk identification to resolution.
Head of IT
Regular reports not only detailed the number of incidents and response times but also provided tangible evidence of improved resilience. This data became a key enabler for management to justify cybersecurity investments and align them with business priorities.
Another major advantage was the transparent, fixed monthly fee for supervision, regardless of the network’s size or the volume of data. This gave the customer financial predictability and freed the IT team to focus on strategic projects and technology development instead of the day-to-day burden of security tool management.
The deployment was incredibly fast: within a few days, we had full monitoring and proactive oversight without having to deal with additional licensing fees. All data remains with us; we don’t have to send or share it anywhere. From the very beginning, we saw what we had been missing. Thanks to detailed log analyses, we gradually optimized the entire infrastructure, uncovered hidden weaknesses, and took security to a whole new level. Each incident is backed by specific data, so we always have the basis for defending further investments. We are thrilled.
Customer
Through Axians’ SOC-as-a-Service, the engineering company gained more than compliance. It secured proactive defense, operational insight, predictable costs, and stronger governance. By combining local data collection, advanced detection, and continuous expert oversight, Axians empowers small businesses to grow with confidence, without compromising cybersecurity.