Alba processes assigned alerts through your existing security stack, follows entity trails, enriches evidence, classifies with confidence, and recommends or executes customer-approved actions according to policy.
Alba runs in recommend-only, approval-gated, or policy-approved auto-action mode — per customer, per action class. Every query, enrichment step, classification, and response action is logged for audit.
The category was built for enterprise SOCs with full-stack commitments. MSPs and MSSPs operating across mixed customer stacks have different constraints — and most platforms work against them.
Most AI analysts are tightly coupled to a specific EDR, SIEM, or productivity-suite license. If your customers run mixed stacks, you're operating multiple platforms — or asking customers to migrate.
Per-investigation, per-SCU, or platform-bundled pricing scales with alert volume — the opposite of what an MSP needs as customer count grows. Your margin shouldn't move when alert volume does.
Many AI SOC products stop at real or not real. They don't pivot across the SIEM, follow entity trails, or close the response loop — that work still falls to your analysts.
Where MSP support exists, it's often a services wrapper around a single-tenant product. Onboarding tenant 47 becomes a project, not a config change.
Investigation, response, governance, and intelligence — eight surfaces of the Alba SOC Control Plane.
Alba doesn't wait for you to ask questions. It triages the queue, investigates alerts end-to-end, and posts its analysis. Then it learns from the outcome.
Processes your entire alert queue automatically. Fetches context, extracts IOCs, enriches via your threat intelligence platform, runs SIEM queries, and classifies with confidence scores.
Doesn't stop at the first query. Discovers entities in SIEM results, follows trails across hosts, users, and IPs. Iterates until every lead is exhausted.
Every IOC enriched through your threat intelligence platform — OSINT, commercial, and proprietary feeds. MITRE ATT&CK mapping. Dark web monitoring. Per-IOC depth scoring.
Microsoft Defender integrated today; major EDRs adapter-ready. Pull endpoint telemetry, device timelines, and identity-context signals into the investigation flow.
Phishing isn't a separate product — the chat agent, EDR, and TI tools handle suspect emails in the same investigation flow as everything else. Headers, URLs, attachments, sender reputation.
Every investigation produces a tailored response plan. Alba executes it through five safety gates (classification, confidence, age, allow/deny, risk ceiling) against an 18-action catalog spanning EDR, case management, and threat intelligence — or hands the plan to the analyst with one-click approval.
Customer-tunable rules for the repeat patterns. JSON conditions, configurable actions (close, tag, comment, assign, escalate), full audit trail. Run unattended on the high-confidence long tail.
Debug mode exposes every query Alba runs against your SIEM. Full audit trails. Structured logging with timing and cost metrics. You see exactly what Alba did and why.
Alba remembers every investigation. False positive rates per detection rule. IOC prevalence across customers. Historical context that makes every new analysis smarter.
Confirmed true-positive IOCs are pushed back into the AlbaCyber Threat Exchange with TLP marking, scoring, and provenance labels. Every confirmed TP your tenants see makes every other tenant smarter.
Automatically audits every detection rule across your SIEM. Finds broken syntax, silent encoding failures, case sensitivity issues. Auto-generates corrected rules and validates them end-to-end.
Search thousands of past investigations by meaning, not just keywords. "Have we seen this attack pattern before?" Answers in milliseconds, with cross-customer anonymization.
Natural language interface via web UI or Slack with RBAC-gated tools. Real-time streaming. Ask "search for lateral movement in the last 24h" and watch Alba work.
Alba runs a 17-step investigation pipeline for every alert. Here's the path from raw alert to classified, contextualised outcome.
Fetch alert from your case management platform. Parse alert context, source content, and detection query. Extract IOCs from text with junk filtering. Deduplicate.
Every IOC is enriched through your threat intelligence platform. Cross-referenced against investigation history for prevalence. Detection rule exceptions are pre-analyzed for syntax bugs.
Run alert-type-specific SIEM queries against your existing platform. Extract new entities from results. Follow the trail: discovered hosts, users, IPs feed follow-up queries. Repeat until exhausted or depth limit.
Full context sent to your chosen LLM for analysis. Executive summary, evidence chain, MITRE mapping, confidence score. If prior analysis exists, Alba states agreement or disagreement.
For confirmed threats: isolate hosts via your EDR, block IPs at the firewall, disable compromised accounts in your identity provider, create incidents in your ITSM. Each action is configurable: autonomous, approval-gated, or recommend-only.
Post analysis to case management. Tag and close the alert. Store the outcome for future context. Index the investigation for semantic recall. Notify your team. The next investigation is already smarter.
Five dimensions matter when an MSP or enterprise SOC is choosing what to put in front of a customer. Most platforms in this category were architected for a different buyer — here's how the archetypes fall out.
AI assistants tightly coupled to a specific EDR or productivity-suite license. The copilot is a feature of the bigger platform purchase.
Independent triage and investigation tools. Typically priced for the enterprise SOC; multi-tenancy is a services wrapper.
Service-led offerings that compete for the customer relationship rather than through it.
| Decision dimension | Platform-bundled copilots |
Standalone AI SOC analysts |
MDR with AI overlay |
Alba |
|---|---|---|---|---|
| Stack freedom Works with any SIEM, any LLM, no platform lock-in |
○ | ◐ | ○ | ● |
| Evidence depth Multi-pass SIEM investigation, entity-trail following, full audit chain |
◐ | ◐ | ◐ | ● |
| Response governance Policy-gated execution, configurable autonomy |
◐ | ○ | ● | ● |
| Tenant model Multi-tenant by architecture, not by services overlay |
○ | ◐ | ○ | ● |
| Cost model Predictable, no per-alert or per-investigation tax |
○ | ○ | ◐ | ● |
Alba was built from day one as a multi-tenant SOC platform. Customer isolation isn't bolted on — it's the architecture.
Customer-scoped query execution is enforced through tenant mappings, RBAC, and audit logging. Every SIEM query is validated against customer-specific index patterns before it runs.
Investigation memory tracks IOC prevalence across all customers. Analysts see "IOC seen across 3 customers" — never names or details.
Every customer on a different SIEM? No problem. One Alba instance handles all of them through unified query abstraction. No rip-and-replace required.
Analysts only see customers they're assigned to. Admins see everything. Tool permissions are enforced at execution time, not the UI.
Configure which customers get automated analysis. Alba processes the queue, restores the previous alert owner, and tags completion. Zero manual intervention.
Every layer is independently replaceable. Switch your LLM. Change your SIEM. Add a case management platform. Nothing breaks.
No per-alert software fee. Throughput is modeled to your infrastructure, SIEM load, LLM choice, and policy — not metered against your margin.
Deploy Alba on your own hardware. Run local LLMs for complete data sovereignty. Nothing leaves your network.
Fully managed Alba deployment. We handle infrastructure, updates, and scaling. You handle investigations.
Custom deployment, dedicated support, and joint development of industry-specific capabilities.
A structured 14-day proof-of-value against your environment, scoped to one SIEM and three detection rules, with a defined scorecard agreed up front. Demo first if you'd rather see it run before you scope.