Skip to content

Introduction

Seliq is an AI-native Security Operations platform built for modern SOCs and MSSPs. Analysts use it to ingest alerts from any source, let AI instantly triage and summarise them, investigate incidents end-to-end, and communicate with clients — all in one place. No context switching. No spreadsheets. No missed SLAs.

Seliq is designed for two types of operators:

In-house SOC teams managing a single organisation’s security environment. You deal with high alert volume, fragmented tooling, and pressure to reduce mean time to respond (MTTR).

MSSPs running security operations for multiple clients simultaneously. You need per-client isolation, consolidated visibility, SLA compliance at scale, and efficient client reporting — usually with a lean analyst team.

If either of those sounds like you, you’re in the right place.

Seliq sits between your existing security tools and your analysts. It:

  1. Ingests alerts from your connected sources (SIEMs, EDRs, cloud platforms, and more)
  2. Triages them using AI — correlating related events, generating summaries, and scoring severity
  3. Guides analysts through the investigation lifecycle with timeline, evidence, and playbook views
  4. Reports to clients via auto-drafted incident updates and post-incident reports

You keep your existing tools. Seliq adds the intelligence layer on top.

SectionWhat you’ll find
Getting StartedOnboarding, workspace setup, inviting your team
Core FeaturesDeep dives into every platform capability
IntegrationsConnecting your existing security stack
For MSSPsMulti-tenant setup, SLAs, white-label reporting
ReferenceAPI docs, glossary, changelog