What Protection Level Do You Need?
Pricing is based on the size of your organization and your needed protection level.
Contact us to learn more!
Starter |
Standard |
Plus |
Pro |
|
---|---|---|---|---|
360-degree assessment |
Lite |
|||
Device setup & installation |
||||
Log monitoring |
||||
Firewall management and monitoring |
Cloud environment SaaS/IaaS monitoring and secure configuration/device support |
|||
Security intelligence (IP monitoring and alerting) |
Email and PII monitoring/alerting |
Email and PII monitoring/alerting Live web traffic monitoring |
||
Automated email alerts |
Standard |
User-customized |
User-customized Via voice alerts |
|
Vulnerability scanning and reporting |
Weekly |
Weekly |
Weekly |
Weekly Two penetration tests a year |
Activity report |
Weekly |
Weekly |
Weekly |
Enhanced |
Annual security training for all employees |
Specialized training for security administrators |
Specialized training for security administrators An annual tabletop exercise for incident response and disaster recovery |
||
Live incident response support time per month |
1 Hour |
2 Hours |
4 Hours |
|
Device backup with customized policies/procedures/plans |
Device backup with customized policies/procedures/plans |
From Zero to 360
Our 360-Degree Review looks at your threat landscape, risk tolerance, regulations, operational environment, and current cybersecurity assets. With this view, we can calibrate a roadmap for a “best fit” information security approach. This review is conducted by seasoned security experts with decades of experience building and running cyber security programs.