Pricing

1. Vulnerability Assessment (VA)

Vulnerability Assessment is often a starting point in cyber security tests. Your websites, operating systems and networks will be scanned for known and common vulnerabilities.
No.ItemDescriptionUnitItem Price
1Web Vulnerability AssessmentVulnerability scans use automated tools, with some manual support, to identify known weaknesses in a target enterprise.
Automated reports will be provided.
01 Website URLContact us for pricing
2External OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed OUTSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing
3Internal OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed INSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing

2. Penetration Testing (PT)

After Vulnerability Assessment, Penetration Testing will further help you to understand fully how your websites, mobile applications, operating systems and networks could be exploited using hackers’ techniques
No.ItemDescriptionUnitItem Price
1Web Penetration TestingSecurity researchers to manually reveal security reveal security holes in web sites and detail security assessment report will be given.
- Testing type: Grey-box
- Penetration testing in both auto and manual modes
- Follow OWASP Web Top 10 Standard
- Malicious Input Checks
- Session Violation checks
- Access Control Security Analysis
- Reporting
- Testing to be done in UAT staging environment
- 2 tests required : before and after defect fixing
01 Website URLContact us for pricing
2Mobile Penetration TestingSecurity researchers to manually reveal security reveal security holes in web sites and detail security assessment report will be given.
- Penetration testing in manual and auto modes
- Follow OWASP Mobile Top 10 Standard
- Dynamic Runtime Analysis (Debugging, Memory analysis, IPC mechanisms and app components)
- Network Analysis (Certificate pinning, …)
- Static Analysis (Reverse Engineering)
- Fuzzing APIs called from own mobile apps.
- Testing to be done in UAT staging environment
- 2 tests required : before and after defect fixing
01 ApplicationContact us for pricing
3OS and Network Penetration TestingSecurity researchers to manually reveal security reveal security holes in web sites and detail security assessment report will be given.
- Automatic scan for Vulnerability Assessment by security tools.
- Manual penetration testing consist of Network and System(Black-box/Grey-box) penetration testing
- Customized detail reports will be provided.
- Testing to be done in UAT staging environment
- 2 tests required : before and after defect fixing
1 IPContact us for pricing

3. Security Code Review

Security code review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places.
No.ItemDescriptionUnitItem Price
1Security Code ReviewSecurity experts in software and security team manually review source code for security holes.01 ApplicationContact us for pricing