Pricing

1. Vulnerability Assessment (VA)

Vulnerability Assessment is often a starting point in cyber security tests. Your websites, operating systems and networks will be scanned for known and common vulnerabilities.
No.ItemDescriptionUnitItem Price
1Web Vulnerability AssessmentVulnerability scans use automated tools, with some manual support, to identify known weaknesses in a target enterprise.
Automated reports will be provided.
01 Website URLContact us for pricing
2External OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed OUTSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing
3Internal OS and Network Vulnerability AssessmentUsing Rapid7 Nexpose / Tenable Nessus tools to scan automatically.
- The scan is performed INSIDE the firewalls protecting the sytems.
- Automated report will be provided.
Block 5 IPs / scanContact us for pricing

2. Penetration Testing (PT)

After Vulnerability Assessment, Penetration Testing will further help you to understand fully how your websites, mobile applications, operating systems and networks could be exploited using hackers’ techniques
No.ItemDescriptionUnitItem Price
1Web Penetration TestingSecurity researchers manually reveal security reveal security holes in web sites.
- Testing type: Grey-box
- Penetration testing in both auto and manual modes
- Reports with detail findings, proofs and recommendation.
- Follow OWASP Web Top 10 Standard
- Malicious Input Checks
- Session Violation checks
- Access Control Security Analysis
- Testing to be done in UAT or staging environment
- 2 tests required : Before and after security fixing.
01 Website URLContact us for pricing
2Mobile Penetration TestingSecurity researchers manually reveal security reveal security holes in iOS and Android applications.
- Testing type: Grey-box
- Penetration testing in manual and auto modes
- Reports with detail findings, proofs and recommendation.
- Follow OWASP Mobile Top 10 Standard
- Dynamic Runtime Analysis (Debugging, Memory analysis, IPC mechanisms and app components)
- Network Analysis (Certificate pinning, …)
- Static Analysis (Reverse Engineering)
- Fuzzing APIs called from own mobile apps.
- Testing to be done in UAT or staging environment
- 2 tests required : Before and after security fixing.
01 ApplicationContact us for pricing
3OS and Network Penetration TestingSecurity researchers manually reveal security reveal security holes in operating systems and networks.
- Testing type: Grey-box / Black-box
- Automatic scan for vulnerabilities by security tools.
- Manually identify and exploit vulnerabilities in your networks, systems and network devices.
- Reports with detail findings, proofs and recommendation.
- Testing to be done in UAT or staging environment
- 2 tests required : Before and after security fixing.
1 IPContact us for pricing

3. Security Code Review

Security code review is the process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places.
No.ItemDescriptionUnitItem Price
1Security Code ReviewSecurity experts in software and security team manually review source code for security holes.01 ApplicationContact us for pricing