What Protection Level Do You Need?
Pricing is based on the size of your organization and your needed protection level.
Contact us to learn more!
Standard |
Plus |
Pro |
|
---|---|---|---|
Core Services |
Schedule a Call | Schedule a Call | Schedule a Call |
Endpoint/Log Monitoring |
|||
Vulnerability Scanning |
|||
Automated Reporting |
|||
Threat Intelligence |
|||
Dashboard |
Basic |
Basic |
Custom |
Automated Email Alerts |
|||
Activity Report |
Weekly |
Weekly |
Custom |
360 Assessment w/ IT Policies |
|||
Backup and Recover w/ Testing |
|||
Penetration Testing |
1 Test Per Year |
2 Tests Per Year |
|
Security Training (Phishing) |
1 Per Year |
2 Per Year |
Custom |
IDS/FW Monitoring |
|||
Anti-Virus/Malware |
|||
Dark Web Monitoring |
|||
Social Monitoring |
|||
Live Incident Response |
1 Hr Per Month |
2 Hrs Month |
4 Hrs Per Month |
Extended Services |
|||
GRC & Privacy Services |
Hourly Rate |
Hourly Rate |
Hourly Rate |
FW Management |
Service Fee |
Service Fee |
|
ZenOpz Provided Management IDS/IPS (incl FW Install) |
Service Fee |
Service Fee |
|
Personnel Services |
|||
vCISO |
Hourly Rate |
Hourly Rate |
Hourly Rate |
Security Architect/Engineer |
Hourly Rate |
Hourly Rate |
Hourly Rate |
Schedule a Call | Schedule a Call | Schedule a Call |
Starter |
Starter + |
|
---|---|---|
Core Services |
Schedule a Call | Schedule a Call |
Endpoint/Log Monitoring |
||
Weekly Vulnerability Scanning |
||
Automated Reporting |
||
Threat Intelligence |
||
Dashboard |
Basic |
Basic |
360 Assessment Lite |
||
Automated Alerts |
||
Activity Report |
||
Live Incident Reponse |
1 Hr Per Month |
|
Schedule a Call | Schedule a Call |
Take the first step towards Security. Simplified.
From Zero to 360
Our 360-Degree Review looks at your threat landscape, risk tolerance, regulations, operational environment, and current cybersecurity assets. With this view, we can calibrate a roadmap for a “best fit” information security approach. This review is conducted by seasoned security experts with decades of experience building and running cyber security programs.