What Protection Level Do You Need?

Pricing is based on the size of your organization and your needed protection level.
Contact us to learn more!

Starter

Standard

Plus

Pro

360-degree assessment

Lite

Device setup & installation

Log monitoring

Firewall management and monitoring

Cloud environment SaaS/IaaS monitoring and secure configuration/device support

Security intelligence (IP monitoring and alerting)

Email and PII monitoring/alerting

Email and PII monitoring/alerting

Live web traffic monitoring

Automated email alerts

Standard

User-customized

User-customized

Via voice alerts

Vulnerability scanning and reporting

Weekly

Weekly

Weekly

Weekly

Two penetration tests a year

Activity report

Weekly

Weekly

Weekly

Enhanced

Annual security training for all employees

Specialized training for security administrators

Specialized training for security administrators

An annual tabletop exercise for incident response and disaster recovery

Live incident response support time per month

1 Hour

2 Hours

4 Hours

Device backup with customized policies/procedures/plans

Device backup with customized policies/procedures/plans

From Zero to 360

Our 360-Degree Review looks at your threat landscape, risk tolerance, regulations, operational environment, and current cybersecurity assets. With this view, we can calibrate a roadmap for a “best fit” information security approach. This review is conducted by seasoned security experts with decades of experience building and running cyber security programs.

Read Our Whitepaper
Contact Us Today!