Modular security services. Pick what your environment needs.
Each service addresses a distinct security domain, independently scoped and priced. Start with one control. Add more as your programme matures. Every price is confirmed after scoping, not before.
Security Programs
Know your exposure before an attacker does.
Cybersecurity Assessments
CEH-certified engineers test your defenses the way a real attacker would. Network penetration testing, vulnerability scanning, web application assessment, social engineering, wireless testing, and firewall evaluation. Every engagement produces a prioritized findings report and an executive briefing your leadership team can act on. Engagements are scoped and priced before any work begins. Remote or on-site depending on assessment type.
What's included
- Network penetration testing: external attack surface and internal lateral movement
- Web application vulnerability assessment
- Vulnerability scanning: external and internal IP ranges
- Social engineering: spear phishing and vishing campaigns
- Cybersecurity posture assessment: CIS Critical Security Controls
Contact us — scoped by assessment type and asset count
Full detailsDeploy from scratch or take over an existing setup. MFA enforced. Always governed.
Managed Identity & Access
Whether you need MFA and SSO deployed for the first time or want an expert team to take over ongoing governance of what you already have, we handle both. Identity provider setup, application onboarding, phishing-resistant authentication, and continuous access governance. Cyber insurance compliant from day one.
What's included
- Phishing-resistant MFA: passkeys, security keys, and FIDO2 across all access points
- SSO for 10+ applications: Fortinet FortiAuthenticator Cloud, Cisco Duo, or your current identity provider
- Conditional access policies: right people, right apps, right context
- User provisioning and deprovisioning: access removed the moment someone leaves
- Ongoing access governance and policy management
Contact us — scoped by user count and app footprint
Full detailsReplace your VPN. Users access apps, not your network.
Zero Trust Network Access
ZTNA replaces broad VPN access with identity-verified, application-specific access. Users reach only what their role requires, from any device and any location. If a credential is stolen, the attacker reaches one app and nothing else. The natural starting point before expanding to full SASE. Fixed-scope deployment with phased VPN cutover.
What's included
- VPN replacement: application-level access instead of broad network access
- Identity-verified access: every request authenticated before any app is reached
- Micro-segmentation and least-privilege policy enforcement
- Continuous verification: access revoked if context changes mid-session
- Foundation for expanding to full SASE architecture
Contact us — scoped by user count and apps
Full detailsEvery device protected.
Managed Endpoint Security
AV/EDR deployment and tuning, automated patch management, device encryption, application control, and MDM lifecycle management across Windows, macOS, Linux, and servers. We manage the platform so your team does not have to. Vendor-agnostic: bring your existing investment or we recommend the right fit. Secure onboarding and offboarding included. Compliance evidence produced continuously as a byproduct of day-to-day management.
What's included
- AV/EDR deployment and tuning: vendor-agnostic platform management
- Automated OS and third-party application patch management
- Device encryption: BitLocker and FileVault enforced and monitored fleet-wide
- Application control, USB policies, and MDM enrollment and lifecycle management
- Compliance baseline tracking and audit-ready reporting across your full fleet
Per device, monthly
Full detailsOne platform. Every user. Every location. Every traffic type.
Secure Access Service Edge for Small Business
Replace your patchwork of security tools with one cloud-delivered platform. Private app access, internet traffic inspection, SaaS governance, and branch connectivity unified under a single policy engine. One vendor. One console. One security standard everywhere. Cloud-delivered with no hardware to buy or manage. Phased deployment alongside your existing tools so nothing is removed until the replacement is proven.
What's included
- Secure Private Access: internal app access from any device, no broad network exposure
- Secure Internet Access: all web traffic inspected and filtered at the cloud edge
- Secure SaaS Access: visibility and control over every cloud app your team uses
- SD-WAN: branch connectivity with security enforced at the edge
- One policy engine governing all users, locations, and traffic types
Contact us — scoped by users, locations, and traffic volume
Full details24x7 managed. Always protected.
Managed Firewall Services
24x7 monitoring, threat response, device management, and bi-annual security audits for your existing firewall. Covers Fortinet, Palo Alto, Cisco Firepower, and Cisco Meraki. One point of contact. Fixed scope. Your firewall stays managed so it actually protects you. Designed for SMBs with a single firewall under 300 endpoints. Onboarding completes in 4 to 6 weeks. 36-month term. Firmware patching, VPN management, and configuration backups all included in the monthly rate.
What's included
- 24x7 threat monitoring and security event correlation across hardware, VPN, and capacity
- Threat response: resolution or risk mitigation by certified security engineers
- Device management: firewall rules, NAT, VPN configuration, patching, and configuration backups
- Bi-annual firewall rule and policy audit against industry best practices
- Quarterly security event report with remediation steps and trend analysis
Per firewall, monthly recurring
Full details24x7 detection. AI-powered response.
Managed AI SOC
AI-powered Security Operations Center with continuous monitoring across your network, endpoint, and cloud layers. Agentic AI triages alerts, investigates threats, and executes containment. Expert analysts handle the complex. AI handles the routine. No gaps between shifts, no alerts waiting until morning, no analyst burnout from raw alert volume. Threat hunting runs continuously, not on-demand.
What's included
- 24x7 monitoring: network, endpoint, and cloud unified in one operational view
- Agentic AI threat correlation, severity scoring, and automated triage of every alert
- Automated containment playbooks with human approval gates for high-impact actions
- Expert security analysts for proactive threat hunting and complex incident investigation
- Compliance reporting and audit evidence: SOC 2, HIPAA, and PCI DSS maintained continuously
Contact us — tiered by environment size
Full detailsTrain your team to recognize attacks. Measure who is at risk. Reduce human error.
Security Awareness Training
Your employees are tested by real attackers every day. A single phishing click bypasses every technical control you have deployed. We deliver a cloud-based platform that simulates real phishing attacks, measures who clicks, and automatically assigns targeted training to close the gap. Behavioral risk scoring identifies your highest-risk users so your other security tools can tighten controls around them automatically.
What's included
- Realistic phishing simulations: credential harvesting, BEC, QR code, and attachment attacks
- Time-of-click training: immediate education the moment an employee falls for a simulation
- Behavioral risk scoring: user, group, and organization-level visibility into human risk
- Smart Groups: dynamic targeting based on risk score, department, and simulation behavior
- Automated remedial training: users who fail simulations enrolled in targeted follow-up content
Contact us — per user, per year. Minimum 25 users
Full detailsLeadership visibility into security.
Security Governance & Reporting
Monthly executive security reporting, risk metrics dashboard, compliance status tracking, and control effectiveness monitoring. One report covers every security layer. Designed for leadership, not analysts. Your team reviews it and acts on what matters. Connects to your existing security tools. First report delivered within 30 days of onboarding.
What's included
- Monthly executive security report: threat summary, risk posture, and compliance status
- Risk metrics and trending: month-over-month posture scoring across all layers
- Compliance status dashboard: live control coverage across active frameworks
- Control effectiveness monitoring: verifies controls are working, not just deployed
- Between-cycle escalation for critical issues, not held for the next monthly report
Contact us — ongoing monthly service
Full detailsService Tiers and Solution Bundles
Find the right starting point for your business size.
Select your segment to see what most organizations your size deploy and the pre-scoped bundle that covers it.
What most Micro-SMB businesses deploy
MFA + endpoint protection — the two controls required by most cyber insurance carriers.
Typical services
Start with the basics. Build on them.
Pre-scoped solution bundle
Everything your insurer requires. Fixed scope. 30 days to compliant.
Built for Micro-SMB organizations that need to obtain or renew cyber insurance. Covers every control insurers currently require as a single fixed-scope engagement.
Included services
- Managed Identity and Access
- Managed Endpoint Security
- Security Awareness Training
- Managed Backup and Data Protection
- Incident Response Planning
Service stacks are representative. Bundle scope confirmed after a discovery call.
Integrated Security
Five layers. One integrated stack. Zero gaps between them.
Most businesses buy security tools one at a time. The result is gaps between vendors, alerts that do not correlate, and attacks that slip through. Every layer we deploy shares intelligence with every other layer.
Edge Protection
Next-gen firewalls and SD-WAN inspect every packet entering and leaving your network. Threat signatures feed the endpoint and email layers automatically.
Email Security
Sandboxing, URL isolation, and attachment inspection block phishing and BEC before they reach inboxes. High-risk users are flagged for stricter monitoring across every other layer.
Endpoint Detection
Behavioral detection and 24x7 monitoring on every device catch malware, ransomware, and lateral movement. Compromised endpoints trigger identity lockouts automatically.
Identity and Access
MFA, SSO, and conditional access policies stop credential theft from becoming a breach. Failed authentication attempts trigger endpoint scans across the stack.
Data Protection
DLP monitors and controls sensitive data movement across your environment. Data patterns feed behavioral analytics so high-risk users are watched more closely across every layer.
Why integration matters: When email security detects a phishing attempt, the high-risk user is flagged, identity requires additional verification, the endpoint increases monitoring, and data protection restricts sensitive file access. One event. Five layers respond. One compromised credential does not become a full breach.
Cyber Insurance
Get insured. Stay insured.
Cyber insurance is not optional anymore. Customers require it, lenders require it, and boards expect it. Getting coverage requires documented security controls that most organizations do not have in place.
We deploy exactly what underwriters mandate, maintain the documentation they need for renewals, and help you get covered in 12 weeks from kickoff.
What underwriters require in 2026
MFA on all accounts
Every user, every application
EDR on all endpoints
Active monitoring required, not just AV
Email security with sandboxing
URL isolation and attachment inspection
Immutable backups tested quarterly
Offline or offsite copy required
Security awareness training
Phishing simulation documented
Incident response plan
Tested annually, documented
Privileged access management
Admin accounts separately governed
Critical patches within 72 hours
Automated patch management required
Network segmentation
Sensitive systems isolated
SIEM logging with 90 day retention
Increasingly mandated for 1M coverage
Requirements vary by industry and coverage limits. These represent baseline requirements for $1M or more coverage in 2026.
Build your security programme.
We will assess your environment, identify the services that address your highest risks, and build a transparent proposal scoped to your specific situation.
Start with a bundle or build from individual services. Quote delivered within 48 hours.