Pricing

1. Vulnerability Assessment (VA)

Vulnerability Assessment is often a starting point in cyber security tests. Your websites, operating systems and networks will be scanned for known and common vulnerabilities.
No.ItemDescriptionUnitItem Price
1Web Vulnerability AssessmentVulnerability scans use automated tools, with some manual support, to identify known weaknesses in a target enterprise.
Automated reports will be provided.
01 WebsiteContact us for pricing
2External OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed OUTSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing
3Internal OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed INSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing

2. Penetration Testing (PT)

After Vulnerability Assessment, Penetration Testing will further help you to understand fully how your websites, mobile applications, operating systems and networks could be exploited using hackers’ techniques
No.ItemDescriptionUnitItem Price
1Web Penetration TestingSecurity experts manually reveal security holes in web sites.
Manual reports will be provided.
01 Website / scan
(Max 5 functions)
Contact us for pricing
2Mobile Penetration TestingSecurity experts manually reveal security holes in mobile applications.
Manual reports will be provided.
01 App / scan
(Max 5 functions)
Contact us for pricing
3OS and Network Penetration TestingSecurity experts manually reveal security holes in networks and systems (Black / Grey-box testing).
Customized reports will be provided.
1 IP / scanContact us for pricing

3. Security Code Review

Security code review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places.
No.ItemDescriptionUnitItem Price
1Security Code ReviewSecurity experts in software and security team manually review source code for security holes.01 App / scan
(Max 5 functions)
Contact us for pricing