Meet Our Security Experts

The Armor Security Operations Center was formed with a keen understanding of the strategies and tactics threat actors employ against organizations around the world. We didn’t just stand up a SOC. We stood up a collection of counterthreat experts working in unison to take on even the most advanced actors and make perpetrating cybercrime against our customers nearly impossible.

Our scalable approach to managed cloud security ensures that you’re always supported by proven security talent capable of mitigating any level of cyber attack. The certified security badasses in our security operations center (SOC) push best-of-breed technologies beyond their limits – frustrating threat actors and keeping your critical data safe.



A SQL injection attack could have devastated multiple banking sites, but Armor was on the case. See more about the cybersecurity attack with our infographic.

Brooke Blackwell Image

Brooke Blackwell

Strategic Web Guru

Security Operations Center in Action

Our Security Operations Center experts tirelessly monitor and protect your critical data workloads and applications, no matter where they’re located.When you partner with Armor, our security experts extend your security program through 24/7/365 monitoring and protection.

Learn how they work to form a protective barrier against threat actors and their attempts to compromise your organization.

View Video Transcript

Get to Know the Team


Armor Security Operations (SecOps) is staffed with experts in each of these areas:

Security Operations Center (SOC)

  • Indications and Warnings (I&W): 24/7/365, this team is always monitoring your security posture, looking for anomalies and suspicious activity. In the event of potential compromise, they quickly escalate security events for deeper assessment and response.
  • Incident Response & Forensics (IRF): When suspicious activity is detected, our IRF team dives into forensics analysis to determine if the incident is a true positive. If a compromised host is detected, they work with the customer to contain, eradicate and recover from the threat, usually in less than 24 hours. After the threat is remediated, they coordinate with customers to the address root cause of the compromise and prevent future attacks through the same vector.
  • Vulnerability Threat Management (VTM): Threat actors are always looking for an easy way in to your environment. This is why vulnerability and patch management are essential for lowering your environment’s surface area of attack. Our aggressive vulnerability assessment program keeps our customers’ infrastructure hardened against attack.
  • Threat Resistance Unit (TRU): Our TRU team provides actionable cyber threat intelligence that allows us to anticipate, and block a large majority of the cyber-attacks against our customers, allowing us to provide unparalleled protection in the cloud. We collect and analyze data from 150 plus threat intelligence feeds to create a detailed overview of current and emerging threats. This keeps us a step ahead of threat actors, able to block their attacks before they even have a plan of attack.
  • Friendly Network Forces (FNF): We combined former National Security Agency online operators with our most experienced Armor engineer, to create an internal threat hunting team. These talented threat hunters look for gaps or seams in the security surveillance of our customer networks. In other words, we have the best hackers in the world, trying to break into our environment to make sure no one else can.


Shorter Dwell Time than Industry Average


Protection Rate


Security Incidents Managed Yearly


In Payments Protected Yearly


At Armor, we designed our approach and built our teams to do one thing – make it harder and harder for an adversary to harm our customers.

Most threat actors are looking for the path of least resistance. At Armor, we’ve created the opposite. Through prevention, advanced detection and active threat hunting, we work to put in obstacles in place that turn away even the most advanced adversaries. And we don’t stop there.

Reduce the attack surface for our customers.

Push Code

Push the required skillset of the threat actor up by making it harder and harder to bypass security controls.

Disrupt processes as early as possible for advanced threat actors.


We consider it one of the most critical measures for assessing the success of any security program. Surprisingly, most security service providers steer well clear of talking about dwell time with their customers. We live by it. You should too.

Circle with arrows representing continuous response

We perform continuous response – going above and beyond what traditional managed security providers do – to respond and eliminate threats aggressively, resulting in an average dwell time of less than 1 day compared to an industry average of 100+ days. Security is our business and we mean business.


We constantly enhance the protections our customers count on. Insights and intelligence gleaned from monitoring customer environments are continually adapted into countermeasures, further automation, orchestration and playbooks, enhancing the effectiveness of our Security Operations Center teams and our Spartan platform.

Simple Clock Icon

We consider it one of the most critical measures for assessing the success of any security program. Surprisingly, most security service providers steer well clear of talking about dwell time with their customers. We live by it. You should too.



While fully managing your cloud data security has advantages, the costs, complexity and overabundance of security tools often outweigh the benefits.

Challenges include:

  • Hiring and retaining difficult-to-find security talent
  • Keeping pace with increasing security costs
  • Selecting the right tools to defend your data
  • Ensuring rapid incident response and management in the event of a data breach
  • Understanding and adhering to critical security controls necessary for compliance

Armor simplifies these challenges by extending your team through managed security services from our SOC.

So, while there are still aspects you’re ultimately responsible for when it comes to securing your data, we lessen that burden by providing expertise, guidance and assistance when navigating the intricacies of security and compliance in the cloud.

White Papers

The Complexities of the Secure DIY Cloud

Developing and maintaining a DIY cloud comes with mountain of cyber security complexities that can leave an organization vulnerable. Learn how to stay secure.