Introduction
Seliq is an AI-native Security Operations platform built for modern SOCs and MSSPs. Analysts use it to ingest alerts from any source, let AI instantly triage and summarise them, investigate incidents end-to-end, and communicate with clients — all in one place. No context switching. No spreadsheets. No missed SLAs.
Who this is for
Section titled “Who this is for”Seliq is designed for two types of operators:
In-house SOC teams managing a single organisation’s security environment. You deal with high alert volume, fragmented tooling, and pressure to reduce mean time to respond (MTTR).
MSSPs running security operations for multiple clients simultaneously. You need per-client isolation, consolidated visibility, SLA compliance at scale, and efficient client reporting — usually with a lean analyst team.
If either of those sounds like you, you’re in the right place.
How Seliq works
Section titled “How Seliq works”Seliq sits between your existing security tools and your analysts. It:
- Ingests alerts from your connected sources (SIEMs, EDRs, cloud platforms, and more)
- Triages them using AI — correlating related events, generating summaries, and scoring severity
- Guides analysts through the investigation lifecycle with timeline, evidence, and playbook views
- Reports to clients via auto-drafted incident updates and post-incident reports
You keep your existing tools. Seliq adds the intelligence layer on top.
Navigating these docs
Section titled “Navigating these docs”| Section | What you’ll find |
|---|---|
| Getting Started | Onboarding, workspace setup, inviting your team |
| Core Features | Deep dives into every platform capability |
| Integrations | Connecting your existing security stack |
| For MSSPs | Multi-tenant setup, SLAs, white-label reporting |
| Reference | API docs, glossary, changelog |