If you have answered yes to any (or most) of these questions, contact us to ask how we can help you improve your cybersecurity posture that won't cost you an arm and a leg.
Feature List | Free | Essential | Premium | Business 360 |
---|---|---|---|---|
External Risk Scan Gain actionable insights on external threats by scanning digital footprint and exposed vulnerabilities More info. Access your Cyber Risk Dashboard based on the domain scan that includes the following: - Web technologies findings - Security findings - DMARC lookup i.e., Domain-based Message Authentication, Reporting, and Conformance - SPF lookup i.e., the Sender Policy Framework (SPF), which is an email authentication protocol designed to prevent email spoofing, a common technique used in phishing attacks and email spam. | ||||
Detailed Scan Report Detailed report that is available between 3 to 72 hours including any Dark Web Findings and digital Assets at risk | ||||
Check your suppliers and vendors Understand 3rd party risk by adding domains/assets of your suppliers and vendors | Up to 3 | Up to 10 | Up to 25 | Unlimited |
E-mail security Stay ahead of potential email threats by leveraging a user-friendly active protection | ||||
Cloud Data Protection Enable cloud data protection to achieve a safe and secure data collaboration with external users More info. Protection for Sharepoint Online, Dropbox Teams, Google Workplace, Monday.com and Slack. | ||||
Cybersecurity Awareness Training Equip employees to be the first line of defence against the evolving landscape of cyber threats | ||||
Endpoint Security Protect laptops, and desktops from cyber threats such as malware, and ransomware | ||||
Secure Browsing Keep your browser secure with the Beacon extension for protection against viruses and malicious sites | ||||
Phishing Simulations Continually simulating cyberattacks like phishing emails to highlight weak spots | ||||
Regular reviews and progress reporting Review of your security posture by cybersecurity experts to evaluate progress and guidance on next logical steps | Yearly | Quarterly | Monthly | |
Regular monitoring and alerting We will alert you in case of any suspicious logins, out of date antivirus, unpatched PCs, or laptops etc., and recommend the steps to resolve issues | Monthly | Weekly | Daily | |
Pay per use $255 per hour | Pay per use $180 per hour | Includes 2 Hrs per month Additional at $180 per hour | Includes 4 Hrs per month Additional at $180 per hour | |
1800 E CYBER Get access to Cybersecurity professionals on 1800 E CYBER to guide your cyber maturity | Add on | Add on | ||
Cybersecurity and ICT policies Assistance with uplifting Organisational Policies & Procedures | Add on | |||
Regulatory compliance for your industry / sector Assistance with Regulatory Compliance for your industry (Privacy Act, Notifiable Data Breaches (NDB), Essential Eight, etc.) | Add on | |||
Business Continuity Planning (BCP) planning Assistance with Business Continuity / Disaster Recovery Planning from senior cybersecurity professionals | Add on | |||
Post incident support Full-scale Incident Response and Incident Management assistance with recovery efforts to get you back to business-as-usual | Add on | Add on | ||
Cyber Insurance Readiness Consult From looking at the cybersecurity posture and minimum insurance requirements to assisting you with filling out the form with correct information | Up to 45 minutes | Up to 45 minutes | ||
Cyber Insurance Transfer the cyber risk associated with evolving cyber threats with tailored coverage at the right price | Add on | Add on | Add on |