Pricing
Cyberwolfe specializes in identifying threats and digital assets that are made publicly available due to human error or malicious actors.
Your security matters.
Identify issues if you suspect you've been hacked.
- Extensive collection
- Expert curation
- Effective mitigation
Silver
Your choice of one of the following:
Web Application: One Penetration test per year & Monthly vulnerability scan
OR
Network: One Penetration test per year & Monthly vulnerability scan
OR
Cloud: One Penetration test per year & Monthly vulnerability scan
**based on annual billing
Web site with resolvable URL. Network range. Cloud with IaaS, PaaS and SaaS
Web Application Security Monitoring
Web Application Protection
Ad-Hoc Incident Response.
Gold
Your choice of one of the following:
Web Application: Four Penetration tests per year & Monthly vulnerability scan
OR
Network: Four Penetration tests per year & Monthly vulnerability scan
OR
Cloud: Four Penetration tests per year & Monthly vulnerability scan
**based on annual billing
The below description gives a generic overview of some of the areas that will be assessed by the tester:
Enumeration / Reconnaissance
Exploitation Testing
Test Coverage
Manual Pen Test Deliverables
Platinum
Web Application: Continuous Penetration tests & vulnerability. DevSecOps CI/CD pipeline for continuous security monitoring, including docker, cloud or on-premises
OR
Network: Continuous Penetration tests & vulnerability. CI/CD pipeline for continuous security monitoring, including docker, cloud or on-premises
OR
Cloud: Continuous Penetration tests & vulnerability. CI/CD pipeline for continuous security monitoring, including docker, cloud or on-premises
**based on annual billing
Frequently Asked Questions
Answer:
Yes, threats are increasing exponentially in sophistication, intensity, diversity and volume. Cyber experts report significant escalation in external cyber attacks, especially from criminal organizations and foreign state sponsored activities.
Hacking, malware, ransomware and cyber terrorism are all part of the evolving landscape of threats facing government organizations. Governments at all levels are inherently “open” organizations and this makes their digital assets attractive targets. Government information resources are becoming increasingly more difficult to protect as more processes become digital and citizen services move online.