Obsidian Ridge

For your business

Managed Security For Growing Businesses

Enterprise-grade threat detection, identity protection, and compliance support - built for companies that need security solved, not managed.

TL;DR

What is this, who is it for, what does it cost, and what makes it different?

This is managed security and compliance support for businesses with 5 to 200 employees that need protection without building a full internal security team first. Pricing starts at $15 per agent per month with no minimum, with bundles for identity coverage and full SIEM-backed programs. The difference is direct practitioner contact, Huntress-backed tooling, and a program built to help with both real risk and audit pressure.

The Reality

The SMB Security Reality

Small and mid-sized businesses are the primary target of cyberattacks today - not because they're valuable, but because they're easier to compromise than large enterprises. Most can't afford a full-time security team, but they're held to the same compliance standards, customer expectations, and insurance requirements as organizations ten times their size. Obsidian Ridge closes that gap.

Pricing

Service Plans

Foundation

$15/agent/month

Month-to-month, no minimum

Managed EDR, no contract

Managed EDR on every endpoint, monitored 24/7 by the Huntress SOC. Month-to-month, no minimum, no contract — install and uninstall agents at any time.

  • Managed EDR on every laptop, desktop, and server
  • Alert triage and human review of every isolation event
  • Quarterly posture check-in
  • Email support
  • Install / uninstall agents at any time

What this replaces or complements

  • Standalone EDR subscriptions like SentinelOne or Microsoft Defender for Business
  • DIY agent install and tuning with no human reviewing alerts
  • Manual monthly log review that never quite happens

Compliance alignment

Cyber insurance baseline ✓SOC 2 readiness ◐HIPAA Security Rule ◐
Request Pricing

Complete

From $55/user/month

Scoped — SIEM data sources priced separately

EDR + ITDR + SAT + Managed SIEM

Full security program with Managed SIEM, audit-grade log retention, fractional CISO advisory, and quarterly tabletop exercises for companies that need serious coverage without building an internal team.

  • Everything in Protected
  • Managed SIEM with log aggregation across endpoint, identity, network, and cloud
  • 90-day searchable log retention for audit response
  • Quarterly tabletop exercise
  • Fractional CISO advisory — 4 hours per month
  • Annual security assessment and audit prep support

What this replaces or complements

  • Separate SIEM collection and alerting tools
  • Fractional CISO retainers with no monitoring capability behind them
  • Patchwork security stack assembled from multiple point vendors

Compliance alignment

Cyber insurance baseline ✓SOC 2 readiness ✓HIPAA Security Rule ✓
Request Pricing

Pricing reflects starting rates. Final pricing depends on environment complexity, number of users, and chosen options. All plans include onboarding.

Centralized security visibility

Centralized security visibility

See what's happening across every layer of your environment - without dashboards your team won't open.

Most small businesses run security tools that work in isolation - a firewall here, endpoint protection there, identity for logins, maybe cloud accounts you forgot you connected. When something goes wrong, the evidence is scattered across five different systems, and nobody on your team has time to piece it together.

As part of the Complete tier, we connect your existing security tools - firewalls, endpoint agents, identity providers, cloud accounts - into a single security data layer (a SIEM, technically) and watch the whole picture for you.

Behind the scenes is Huntress's 24/7 SOC reviewing the data we feed in. In front of you is a written monthly report - plain English, business-readable - summarizing what we observed, what was investigated, and what you should know.

What you get

  • Centralized visibility across firewalls, endpoints, identity systems, DNS filtering, and cloud accounts
  • 24/7 monitoring by Huntress's SOC behind the scenes
  • A written monthly report in business-readable language
  • Compliance evidence that satisfies logging and monitoring requirements for cyber insurance, SOC 2, HIPAA, PCI-DSS, and CMMC
  • No new dashboards for your team to learn - we handle the visibility, you get the summary

What this replaces or complements

  • Standalone SIEM platforms (Splunk, Datadog, Microsoft Sentinel - typically $15K-$80K+/year for SMB-scale deployments)
  • Managed SOC services from larger MSSPs (typically $50K-$200K/year minimums)
  • Internal log review your team isn't doing because they don't have time
  • Reactive-only security where threats are noticed after the fact

Integrations grid

Works with what you already have.

Firewalls

SonicWallFortinet FortiGatepfSenseWatchGuardCisco MerakiSophosPalo Alto NetworksBarracuda CloudGenCisco Secure Firewall ASACisco FirepowerArista NGUbiquiti

Endpoints

Windows Event LogsLinux Event LogsSyslog

Identity

Cisco Duo1PasswordBitwardenLastPassKeeper

DNS Filtering

DNSFilterCisco Umbrella

Cloud

Microsoft AzureAWS CloudTrailAWS S3Google Cloud (coming soon)

Cloud Security

Wiz

RMM

NinjaOne

Infrastructure

Cloudflare

Generic

HTTP Event Collector for custom integrations

Included in the Complete tier (from $55/user/mo) • Available as an add-on for Protected ($32/user/mo)

See if this fits your environment

What Makes This Different

What Makes This Different

Real partnership, not a portal.

A dedicated security practitioner who knows your environment and your business - not a ticketing system and a faceless team.

Enterprise tools at SMB pricing.

The platforms in these plans are the same ones used by hospitals, financial institutions, and Fortune 500 companies, made accessible through MSSP partnership.

Built for the audits you'll face.

Whether it's SOC 2, HIPAA, or a customer security questionnaire, the program produces the evidence and controls you'll need.

Who This Is For

Who is this for?

  • You have between 5 and 200 employees
  • You don't have a dedicated internal security team
  • You're facing customer security questionnaires, insurance requirements, or compliance obligations
  • You've experienced a security incident and want to make sure it doesn't happen again
  • You want to know your business is protected without becoming a cybersecurity expert yourself

How It Works

How does this work?

01

Discovery call.

A 30-minute conversation to understand your environment, concerns, and what you actually need.

02

Scoped proposal.

A clear written proposal with pricing, scope, and timeline - no hidden fees.

03

Onboarding.

Tools deployed, users enrolled, baseline established. Most businesses are fully onboarded within 2-4 weeks.

04

Ongoing operation.

24/7 monitoring, regular reporting, and continuous improvement of your security posture.

FAQ

FAQ

What size businesses do you work with?

Sweet spot is 5-200 employees. Below 5, the consumer-tier service may be a better fit. Above 200, custom engagements are available.

What if we already use other security tools?

Existing tools are evaluated as part of onboarding. In many cases, current investments are integrated rather than replaced.

How are payments structured?

Monthly billing, invoiced in advance. Annual prepay discount available. Most clients commit to 12-month terms.

What happens during an incident?

Active incidents are responded to within hours, not days. The 24/7 SOC handles initial detection and triage; serious incidents are escalated for hands-on response.

Are you a reseller or a service provider?

Both. Security platforms are licensed through partnership; the service wrapped around them - strategy, response, compliance, executive reporting - is delivered directly. One accountable point of contact.

Do you sign mutual NDAs and MSAs?

Yes, both are standard before any engagement begins.

CTA section

Ready to Talk?

Every business has different needs, risks, and budgets.
The best way to find out if this is a fit is a 30-minute discovery call - no commitment, no pressure.

Schedule Discovery Call

Recently published

What should you read before a discovery call?

Kfir Yair, founder of Obsidian Ridge

Founder

A practitioner-led service model

"After eight years working with security operations and helping companies through compliance audits, we built Obsidian Ridge to give small businesses the same defense capability enterprises have without the price tag or dashboards no one has time to use."

— Kfir, CISSP | Founder