What Protection Level Do You Need?
Pricing is based on the size of your organization and your needed protection level.
Contact us to learn more!
Standard |
Plus |
Pro |
|
---|---|---|---|
Core Services |
Schedule a Call | Schedule a Call | Schedule a Call |
Endpoint/Log Monitoring |
![]() |
![]() |
![]() |
Vulnerability Scanning |
![]() |
![]() |
![]() |
Automated Reporting |
![]() |
![]() |
![]() |
Threat Intelligence |
![]() |
![]() |
![]() |
Dashboard |
![]() Basic |
![]() Basic |
![]() Custom |
Automated Email Alerts |
![]() |
![]() |
![]() |
Activity Report |
![]() Weekly |
![]() Weekly |
![]() Custom |
360 Assessment w/ IT Policies |
![]() |
![]() |
![]() |
Backup and Recover w/ Testing |
![]() |
![]() |
|
Penetration Testing |
![]() 1 Test Per Year |
![]() 2 Tests Per Year |
|
Security Training (Phishing) |
![]() 1 Per Year |
![]() 2 Per Year |
![]() Custom |
IDS/FW Monitoring |
![]() |
![]() |
![]() |
Anti-Virus/Malware |
![]() |
![]() |
|
Dark Web Monitoring |
![]() |
![]() |
|
Social Monitoring |
![]() |
![]() |
|
Live Incident Response |
![]() 1 Hr Per Month |
![]() 2 Hrs Month |
![]() 4 Hrs Per Month |
Extended Services |
|||
GRC & Privacy Services |
Hourly Rate |
Hourly Rate |
Hourly Rate |
FW Management |
Service Fee |
Service Fee |
![]() |
ZenOpz Provided Management IDS/IPS (incl FW Install) |
Service Fee |
Service Fee |
![]() |
Personnel Services |
|||
vCISO |
Hourly Rate |
Hourly Rate |
Hourly Rate |
Security Architect/Engineer |
Hourly Rate |
Hourly Rate |
Hourly Rate |
Schedule a Call | Schedule a Call | Schedule a Call |
Starter |
Starter + |
|
---|---|---|
Core Services |
Schedule a Call | Schedule a Call |
Endpoint/Log Monitoring |
![]() |
![]() |
Weekly Vulnerability Scanning |
![]() |
![]() |
Automated Reporting |
![]() |
![]() |
Threat Intelligence |
![]() |
![]() |
Dashboard |
![]() Basic |
![]() Basic |
360 Assessment Lite |
![]() |
![]() |
Automated Alerts |
![]() |
![]() |
Activity Report |
![]() |
![]() |
Live Incident Reponse |
![]() 1 Hr Per Month |
|
Schedule a Call | Schedule a Call |

Take the first step towards Security. Simplified.
From Zero to 360
Our 360-Degree Review looks at your threat landscape, risk tolerance, regulations, operational environment, and current cybersecurity assets. With this view, we can calibrate a roadmap for a “best fit” information security approach. This review is conducted by seasoned security experts with decades of experience building and running cyber security programs.
