What Protection Level Do You Need?
Pricing is based on the size of your organization and your needed protection level.
Contact us to learn more!
Starter |
Standard |
Plus |
Pro |
|
---|---|---|---|---|
360-degree assessment |
![]() Lite |
![]() |
![]() |
![]() |
Device setup & installation |
![]() |
![]() |
![]() |
![]() |
Log monitoring |
![]() |
![]() |
![]() |
![]() |
Firewall management and monitoring |
![]() |
![]() |
![]() Cloud environment SaaS/IaaS monitoring and secure configuration/device support |
|
Security intelligence (IP monitoring and alerting) |
![]() |
![]() |
![]() Email and PII monitoring/alerting |
![]() Email and PII monitoring/alerting Live web traffic monitoring |
Automated email alerts |
![]() |
![]() Standard |
![]() User-customized |
![]() User-customized Via voice alerts |
Vulnerability scanning and reporting |
![]() Weekly |
![]() Weekly |
![]() Weekly |
![]() Weekly Two penetration tests a year |
Activity report |
![]() Weekly |
![]() Weekly |
![]() Weekly |
![]() Enhanced |
Annual security training for all employees |
![]() |
![]() Specialized training for security administrators |
![]() Specialized training for security administrators An annual tabletop exercise for incident response and disaster recovery |
|
Live incident response support time per month |
![]() 1 Hour |
![]() 2 Hours |
![]() 4 Hours |
|
Device backup with customized policies/procedures/plans |
Device backup with customized policies/procedures/plans |
From Zero to 360
Our 360-Degree Review looks at your threat landscape, risk tolerance, regulations, operational environment, and current cybersecurity assets. With this view, we can calibrate a roadmap for a “best fit” information security approach. This review is conducted by seasoned security experts with decades of experience building and running cyber security programs.
