Pricing + Services

 
 

Our Pricing is as customizable as our services.  Contact us for a quick discussion so that we can get you a quote.

 

 

 PENETRATION TESTING

  • Red Team
  • Network, Web Application, Custom Application, Mobile, Cloud, Virtualized, Wireless
  • Social Engineering

 STRATEGIC PLANNING

  • Policies, Procedures, Standards & Guidelines 
  • Governance Framework
  • Business Continuity, 
  • Disaster Recovery

 ASSESSMENT & DESIGN

  • Budget Creation Workshops
  • Security Risk & Maturity
  • Security Architecture
  • Virtual Environment
  • Network Segmentation
  • Third Party Vendors, 
  • Mergers & Acquisitions
  • Security Technology 
  • Compliance Readiness
  • Configuration Reviews

 COMPLIANCE READINESS & REVIEW

  • ISO 27001-2, NIST 800-53, RMF, NISPOM, DFARS: NIST 800-171, PCI, GDPR, HIPAA, FedRamp, FISMA, SCADA, NERC/FERC

SECURITY MONITORING

  • Security Log Collection
  • Forensic Log Analysis 
  • Data Incident Correlation
  • Alert Generation
  • Incident Prioritization


ADVANCED MONITORING

  • Indicators of Compromise 
  • Homoglyph Domain Alerting  
  • Suspicious User Detection
  • Domain Generation Algorithm (DGA) Detection
  • Suspicious VPN Monitoring
  • Public Credential Exposures
  • Rogue Device Detection
  • Slack / HipChat Alerting

 MANAGED SERVICES

  • Perimeter (FW / VPN / IDS / IPS)
  • APT Technology
  • Encryption / PKI / HSMs
  • Spam & Messaging
  • Data Loss Prevention
  • End Point Protection

 THREAT & VULNERABILITY

  • Vulnerability Reporting 
  • Intelligence
  • Threat Warning
  • Asset Tracking

INCIDENT RESPONSE

  • IR Planning & Development 
  • Incident Management
  • Incident Responders
  • Retained or OnDemand Support

 INCIDENT ANALYSIS

  • Data Capture
  • Digital Forensics
  • Malware & Ransomware Recovery
  • Cyber Stalking
  • Reverse Engineering
  • Evidence Discovery 
  • Incident Reporting
  • Evidence Custodianship

CYBER & SECURITY LITIGATION SUPPORT

  • e-Discovery
  • Legal Action Preparation, Response & Analysis
  • Expert Witnesses

CISO ON-DEMAND

  • Interim or Virtual CISO
  • Program Development
  • Program Management
  • Budget Planning
  • Resource Planning
  • Secure Business Solutions

 CORPORATE STRATEGY

  • Healthcheck & Prioritization
  • Executive Security Briefings
  • Initiative Prioritization
  • Vendor Analysis
  • Security Portfolio Analysis

 COST REDUCTION & CONSOLIDATION

  • Budgetary Analysis 
  • Cloud Adoption
  • Virtualization Options
  • Outsourcing Feasibility
  • Licensing Evaluation

 EXECUTIVE AUDIT SERVICES

  • Management 
  • Preparation 
  • Impact Reduction
  • Finding Disputes 
  • Sensitivity Training

 SECURITY EDUCATION

SOLUTION ANALYSIS

  • Buy vs. Build Analysis
  • Requirements Gathering Requirements Analysis & Documentation

 SOLUTION VALIDATION

  • Solution Evaluation & Recommendation
  • Laboratory Testing
  • Solution Documentation
  • Vulnerability Testing
  • Implementation & Rollout

 LICENSING SERVICES

  • Licensing Support
  • Cost Analysis
  • Vendor Liaison
  • Vendor Negotiations
  • Price Negotiations

PROJECT MANAGEMENT

  • Security Projects
  • Solution Implementations 
  • Security Programs

 RESOURCE AUGMENTATION

  • Senior Security Management
  • Security Engineers

 IMPLEMENTATION SERVICES

  • Security Technologies 
  • (e.g., PKI, HSM, FW)
  • Installations & Migrations Privacy & Compliance
  • Asset Management
  • Security SDLC
  • ITIL Service Lifecycle
  • Custom Implementations

 ANALYTICS  

  • Executive Reporting
  • Data Correlation
  • Data Analysis & Reporting
  • Metrics Development & Implementation