Pricelist

Whether you are a small business or a large organization, we have a solution tailored to your needs. Pricing is based on the scope of security and number of users, so you only pay for what you actually use.

You will receive a comprehensive technological solution that will strengthen your cyber resilience and ensure support for compliance with the requirements of the international standard ISO 27001 – Information Security Management System (ISMS) and the European NIS2 Directive. With predictable costs and easy deployment, our packages are the ideal choice for companies that want to be prepared for new security challenges.

Number of users: 1

Mini

An ideal start for companies that want to protect their devices quickly and effectively.

EUR 7,81 /month w/o VAT

Package contents

  • Drive Encryption Disk encryption protects sensitive corporate data in the event of a device being lost or stolen. Solutions like BitLocker or ESET Full Disk Encryption ensure that data on the disk cannot be read or misused without authorization.
  • Antivirus + AI threat detection and response (TDR) The combination of modern antivirus and AI-based Threat Detection & Response tools provides advanced protection against known and unknown threats. The system detects anomalies in real time, responds to incidents, and automatically eliminates suspicious activity before it causes damage.
  • Ransomware protection Ransomware protection includes advanced security technologies that detect and block attempts to encrypt data with malicious software in real time. The solution also includes backup, behavioral analysis, and isolation of suspicious processes to minimize the impact of the attack and protect corporate data.
  • Vulnerability management Vulnerability management is the process of regularly scanning and assessing vulnerabilities in infrastructure to minimize security risks. Systems that use the CVE (Common Vulnerabilities and Exposures) database can quickly identify and prioritize vulnerabilities in operating systems, applications, and network elements.
  • Password management Password management ensures the secure storage, sharing, and generation of strong passwords for individuals and teams. Using password management tools can significantly reduce the risk of login data leaks and simplify access to corporate systems.
  • Monthly reporting Monthly reporting provides an overview of system vulnerabilities, update status, and overall security hygiene of the IT infrastructure. These reports help identify weak points and serve as a basis for ongoing optimization
  • Mobile Device Protection Mobile Device Protection protects corporate data on mobile devices with security policies and encryption. It allows you to remotely manage, block, or wipe lost or compromised devices.
  • Siem monitoring It is the process of collecting, analyzing, and correlating security events from various systems to detect threats and anomalies. It enables real-time response to security incidents and provides insight into the overall state of IT security.
  • Network monitoring Network monitoring is the process of continuously monitoring and analyzing a computer network and its components to ensure their optimal and secure operation. It includes monitoring performance, identifying potential problems, and proactively resolving them before they affect users or systems.
  • IPS/IDS IDS and IPS are two types of security systems that are used to protect networks and systems from cyber threats. IDS (Intrusion Detection System) monitors network traffic and alerts you to suspicious activity, while IPS (Intrusion Prevention System) not only detects threats but also actively intervenes and blocks malicious activity.
  • Secure VPN Secure VPN provides a secure, encrypted connection between devices and the corporate network. The solution includes WireGuard, L2TP, and OpenVPN protocols, covering various deployment scenarios and compatibility.
  • Backup Developing a disaster recovery strategy (DRP) and backing up with our backup software combined with QNAP NAS storage ensures secure and automated data storage with fast recovery. The solution supports versioning, encryption, and remote replication, making it ideal for any business looking for a reliable backup strategy.
  • Hardening and compliance System security is implemented according to CIS recommendations, which cover a wide range of operating systems including Windows, Linux and macOS. This ensures a uniform level of protection across the entire IT environment while supporting compliance requirements. Price for organizations up to 50 users
  • Security awareness + phishing training Security awareness training and phishing training increase employees' resilience to the most common types of attacks. Regular simulations and education help prevent human errors that often lead to security incidents.
  • SSO + MFA Combining SSO and MFA with a RADIUS server enables multi-factor authentication for legacy systems that do not support modern authentication methods, while ensuring seamless login for users across different applications and environments.
  • Next Gen FW with zero trust network and DLP The next-gen firewall with Zero Trust support provides advanced traffic control, user identity, and detailed inspection of data flows. It minimizes the risk of attackers moving laterally through the network through network segmentation and access authentication.
  • Advance Data Lost prevention for MS sharepoint,Exchange, OneDrive Data loss prevention (DLP) ensures that sensitive information doesn’t leave your organization without authorization—whether via email, the cloud, or portable media. DLP automatically detects, classifies, and applies policies to control and protect critical data.
Favourite

Medium

Comprehensive security solution for daily operation without downtime.

EUR 140,18 /month w/o VAT

Package contents

  • Drive Encryption Disk encryption protects sensitive corporate data in the event of a device being lost or stolen. Solutions like BitLocker or ESET Full Disk Encryption ensure that data on the disk cannot be read or misused without authorization.
  • Antivirus + AI threat detection and response (TDR) The combination of modern antivirus and AI-based Threat Detection & Response tools provides advanced protection against known and unknown threats. The system detects anomalies in real time, responds to incidents, and automatically eliminates suspicious activity before it causes damage.
  • Ransomware protection Ransomware protection includes advanced security technologies that detect and block attempts to encrypt data with malicious software in real time. The solution also includes backup, behavioral analysis, and isolation of suspicious processes to minimize the impact of the attack and protect corporate data.
  • Vulnerability management Vulnerability management is the process of regularly scanning and assessing vulnerabilities in infrastructure to minimize security risks. Systems that use the CVE (Common Vulnerabilities and Exposures) database can quickly identify and prioritize vulnerabilities in operating systems, applications, and network elements.
  • Password management Password management ensures the secure storage, sharing, and generation of strong passwords for individuals and teams. Using password management tools can significantly reduce the risk of login data leaks and simplify access to corporate systems.
  • Monthly reporting Monthly reporting provides an overview of system vulnerabilities, update status, and overall security hygiene of the IT infrastructure. These reports help identify weak points and serve as a basis for ongoing optimization
  • Mobile Device Protection Mobile Device Protection protects corporate data on mobile devices with security policies and encryption. It allows you to remotely manage, block, or wipe lost or compromised devices.
  • Siem monitoring It is the process of collecting, analyzing, and correlating security events from various systems to detect threats and anomalies. It enables real-time response to security incidents and provides insight into the overall state of IT security.
  • Network monitoring Network monitoring is the process of continuously monitoring and analyzing a computer network and its components to ensure their optimal and secure operation. It includes monitoring performance, identifying potential problems, and proactively resolving them before they affect users or systems.
  • IPS/IDS IDS and IPS are two types of security systems that are used to protect networks and systems from cyber threats. IDS (Intrusion Detection System) monitors network traffic and alerts you to suspicious activity, while IPS (Intrusion Prevention System) not only detects threats but also actively intervenes and blocks malicious activity.
  • Secure VPN Secure VPN provides a secure, encrypted connection between devices and the corporate network. The solution includes WireGuard, L2TP, and OpenVPN protocols, covering various deployment scenarios and compatibility.
  • Backup Developing a disaster recovery strategy (DRP) and backing up with our backup software combined with QNAP NAS storage ensures secure and automated data storage with fast recovery. The solution supports versioning, encryption, and remote replication, making it ideal for any business looking for a reliable backup strategy.
  • Hardening and compliance System security is implemented according to CIS recommendations, which cover a wide range of operating systems including Windows, Linux and macOS. This ensures a uniform level of protection across the entire IT environment while supporting compliance requirements. Price for organizations up to 50 users
  • Security awareness + phishing training Security awareness training and phishing training increase employees' resilience to the most common types of attacks. Regular simulations and education help prevent human errors that often lead to security incidents.
  • SSO + MFA Combining SSO and MFA with a RADIUS server enables multi-factor authentication for legacy systems that do not support modern authentication methods, while ensuring seamless login for users across different applications and environments.
  • Next Gen FW with zero trust network and DLP The next-gen firewall with Zero Trust support provides advanced traffic control, user identity, and detailed inspection of data flows. It minimizes the risk of attackers moving laterally through the network through network segmentation and access authentication.
  • Advance Data Lost prevention for MS sharepoint,Exchange, OneDrive Data loss prevention (DLP) ensures that sensitive information doesn’t leave your organization without authorization—whether via email, the cloud, or portable media. DLP automatically detects, classifies, and applies policies to control and protect critical data.

Maxi

The maximum level of security that protects every aspect of your IT infrastructure.

EUR 304,05 /month w/o VAT

Package contents

  • Drive Encryption Disk encryption protects sensitive corporate data in the event of a device being lost or stolen. Solutions like BitLocker or ESET Full Disk Encryption ensure that data on the disk cannot be read or misused without authorization.
  • Antivirus + AI threat detection and response (TDR) The combination of modern antivirus and AI-based Threat Detection & Response tools provides advanced protection against known and unknown threats. The system detects anomalies in real time, responds to incidents, and automatically eliminates suspicious activity before it causes damage.
  • Ransomware protection Ransomware protection includes advanced security technologies that detect and block attempts to encrypt data with malicious software in real time. The solution also includes backup, behavioral analysis, and isolation of suspicious processes to minimize the impact of the attack and protect corporate data.
  • Vulnerability management Vulnerability management is the process of regularly scanning and assessing vulnerabilities in infrastructure to minimize security risks. Systems that use the CVE (Common Vulnerabilities and Exposures) database can quickly identify and prioritize vulnerabilities in operating systems, applications, and network elements.
  • Password management Password management ensures the secure storage, sharing, and generation of strong passwords for individuals and teams. Using password management tools can significantly reduce the risk of login data leaks and simplify access to corporate systems.
  • Monthly reporting Monthly reporting provides an overview of system vulnerabilities, update status, and overall security hygiene of the IT infrastructure. These reports help identify weak points and serve as a basis for ongoing optimization
  • Mobile Device Protection Mobile Device Protection protects corporate data on mobile devices with security policies and encryption. It allows you to remotely manage, block, or wipe lost or compromised devices.
  • Siem monitoring It is the process of collecting, analyzing, and correlating security events from various systems to detect threats and anomalies. It enables real-time response to security incidents and provides insight into the overall state of IT security.
  • Network monitoring Network monitoring is the process of continuously monitoring and analyzing a computer network and its components to ensure their optimal and secure operation. It includes monitoring performance, identifying potential problems, and proactively resolving them before they affect users or systems.
  • IPS/IDS IDS and IPS are two types of security systems that are used to protect networks and systems from cyber threats. IDS (Intrusion Detection System) monitors network traffic and alerts you to suspicious activity, while IPS (Intrusion Prevention System) not only detects threats but also actively intervenes and blocks malicious activity.
  • Secure VPN Secure VPN provides a secure, encrypted connection between devices and the corporate network. The solution includes WireGuard, L2TP, and OpenVPN protocols, covering various deployment scenarios and compatibility.
  • Backup Developing a disaster recovery strategy (DRP) and backing up with our backup software combined with QNAP NAS storage ensures secure and automated data storage with fast recovery. The solution supports versioning, encryption, and remote replication, making it ideal for any business looking for a reliable backup strategy.
  • Hardening and compliance System security is implemented according to CIS recommendations, which cover a wide range of operating systems including Windows, Linux and macOS. This ensures a uniform level of protection across the entire IT environment while supporting compliance requirements. Price for organizations up to 50 users
  • Security awareness + phishing training Security awareness training and phishing training increase employees' resilience to the most common types of attacks. Regular simulations and education help prevent human errors that often lead to security incidents.
  • SSO + MFA Combining SSO and MFA with a RADIUS server enables multi-factor authentication for legacy systems that do not support modern authentication methods, while ensuring seamless login for users across different applications and environments.
  • Next Gen FW with zero trust network and DLP The next-gen firewall with Zero Trust support provides advanced traffic control, user identity, and detailed inspection of data flows. It minimizes the risk of attackers moving laterally through the network through network segmentation and access authentication.
  • Advance Data Lost prevention for MS sharepoint,Exchange, OneDrive Data loss prevention (DLP) ensures that sensitive information doesn’t leave your organization without authorization—whether via email, the cloud, or portable media. DLP automatically detects, classifies, and applies policies to control and protect critical data.

Custom

Individual solutions tailored to your organization's environment, technologies, and priorities.

EUR 0 /month w/o VAT

Choose

Our solutions are based on products from renowned vendors.

Write Us a non-binding inquiry.

By submitting the form, you agree to the Personal Data Protection Policy.