Sign in
HomeCybersecurityService Catalog

Modular security services. Pick what your environment needs.

Each service addresses a distinct security domain, independently scoped and priced. Start with one control. Add more as your programme matures. Every price is confirmed after scoping, not before.

Security Programs

Know your exposure before an attacker does.

Cybersecurity Assessments

CEH-certified engineers test your defenses the way a real attacker would. Network penetration testing, vulnerability scanning, web application assessment, social engineering, wireless testing, and firewall evaluation. Every engagement produces a prioritized findings report and an executive briefing your leadership team can act on. Engagements are scoped and priced before any work begins. Remote or on-site depending on assessment type.

What's included

  • Network penetration testing: external attack surface and internal lateral movement
  • Web application vulnerability assessment
  • Vulnerability scanning: external and internal IP ranges
  • Social engineering: spear phishing and vishing campaigns
  • Cybersecurity posture assessment: CIS Critical Security Controls

Contact us — scoped by assessment type and asset count

Full details

Deploy from scratch or take over an existing setup. MFA enforced. Always governed.

Managed Identity & Access

Whether you need MFA and SSO deployed for the first time or want an expert team to take over ongoing governance of what you already have, we handle both. Identity provider setup, application onboarding, phishing-resistant authentication, and continuous access governance. Cyber insurance compliant from day one.

What's included

  • Phishing-resistant MFA: passkeys, security keys, and FIDO2 across all access points
  • SSO for 10+ applications: Fortinet FortiAuthenticator Cloud, Cisco Duo, or your current identity provider
  • Conditional access policies: right people, right apps, right context
  • User provisioning and deprovisioning: access removed the moment someone leaves
  • Ongoing access governance and policy management

Contact us — scoped by user count and app footprint

Full details

Replace your VPN. Users access apps, not your network.

Zero Trust Network Access

ZTNA replaces broad VPN access with identity-verified, application-specific access. Users reach only what their role requires, from any device and any location. If a credential is stolen, the attacker reaches one app and nothing else. The natural starting point before expanding to full SASE. Fixed-scope deployment with phased VPN cutover.

What's included

  • VPN replacement: application-level access instead of broad network access
  • Identity-verified access: every request authenticated before any app is reached
  • Micro-segmentation and least-privilege policy enforcement
  • Continuous verification: access revoked if context changes mid-session
  • Foundation for expanding to full SASE architecture

Contact us — scoped by user count and apps

Full details

Every device protected.

Managed Endpoint Security

AV/EDR deployment and tuning, automated patch management, device encryption, application control, and MDM lifecycle management across Windows, macOS, Linux, and servers. We manage the platform so your team does not have to. Vendor-agnostic: bring your existing investment or we recommend the right fit. Secure onboarding and offboarding included. Compliance evidence produced continuously as a byproduct of day-to-day management.

What's included

  • AV/EDR deployment and tuning: vendor-agnostic platform management
  • Automated OS and third-party application patch management
  • Device encryption: BitLocker and FileVault enforced and monitored fleet-wide
  • Application control, USB policies, and MDM enrollment and lifecycle management
  • Compliance baseline tracking and audit-ready reporting across your full fleet

Per device, monthly

Full details

One platform. Every user. Every location. Every traffic type.

Secure Access Service Edge for Small Business

Replace your patchwork of security tools with one cloud-delivered platform. Private app access, internet traffic inspection, SaaS governance, and branch connectivity unified under a single policy engine. One vendor. One console. One security standard everywhere. Cloud-delivered with no hardware to buy or manage. Phased deployment alongside your existing tools so nothing is removed until the replacement is proven.

What's included

  • Secure Private Access: internal app access from any device, no broad network exposure
  • Secure Internet Access: all web traffic inspected and filtered at the cloud edge
  • Secure SaaS Access: visibility and control over every cloud app your team uses
  • SD-WAN: branch connectivity with security enforced at the edge
  • One policy engine governing all users, locations, and traffic types

Contact us — scoped by users, locations, and traffic volume

Full details

24x7 managed. Always protected.

Managed Firewall Services

24x7 monitoring, threat response, device management, and bi-annual security audits for your existing firewall. Covers Fortinet, Palo Alto, Cisco Firepower, and Cisco Meraki. One point of contact. Fixed scope. Your firewall stays managed so it actually protects you. Designed for SMBs with a single firewall under 300 endpoints. Onboarding completes in 4 to 6 weeks. 36-month term. Firmware patching, VPN management, and configuration backups all included in the monthly rate.

What's included

  • 24x7 threat monitoring and security event correlation across hardware, VPN, and capacity
  • Threat response: resolution or risk mitigation by certified security engineers
  • Device management: firewall rules, NAT, VPN configuration, patching, and configuration backups
  • Bi-annual firewall rule and policy audit against industry best practices
  • Quarterly security event report with remediation steps and trend analysis

Per firewall, monthly recurring

Full details

24x7 detection. AI-powered response.

Managed AI SOC

AI-powered Security Operations Center with continuous monitoring across your network, endpoint, and cloud layers. Agentic AI triages alerts, investigates threats, and executes containment. Expert analysts handle the complex. AI handles the routine. No gaps between shifts, no alerts waiting until morning, no analyst burnout from raw alert volume. Threat hunting runs continuously, not on-demand.

What's included

  • 24x7 monitoring: network, endpoint, and cloud unified in one operational view
  • Agentic AI threat correlation, severity scoring, and automated triage of every alert
  • Automated containment playbooks with human approval gates for high-impact actions
  • Expert security analysts for proactive threat hunting and complex incident investigation
  • Compliance reporting and audit evidence: SOC 2, HIPAA, and PCI DSS maintained continuously

Contact us — tiered by environment size

Full details

Train your team to recognize attacks. Measure who is at risk. Reduce human error.

Security Awareness Training

Your employees are tested by real attackers every day. A single phishing click bypasses every technical control you have deployed. We deliver a cloud-based platform that simulates real phishing attacks, measures who clicks, and automatically assigns targeted training to close the gap. Behavioral risk scoring identifies your highest-risk users so your other security tools can tighten controls around them automatically.

What's included

  • Realistic phishing simulations: credential harvesting, BEC, QR code, and attachment attacks
  • Time-of-click training: immediate education the moment an employee falls for a simulation
  • Behavioral risk scoring: user, group, and organization-level visibility into human risk
  • Smart Groups: dynamic targeting based on risk score, department, and simulation behavior
  • Automated remedial training: users who fail simulations enrolled in targeted follow-up content

Contact us — per user, per year. Minimum 25 users

Full details

Leadership visibility into security.

Security Governance & Reporting

Monthly executive security reporting, risk metrics dashboard, compliance status tracking, and control effectiveness monitoring. One report covers every security layer. Designed for leadership, not analysts. Your team reviews it and acts on what matters. Connects to your existing security tools. First report delivered within 30 days of onboarding.

What's included

  • Monthly executive security report: threat summary, risk posture, and compliance status
  • Risk metrics and trending: month-over-month posture scoring across all layers
  • Compliance status dashboard: live control coverage across active frameworks
  • Control effectiveness monitoring: verifies controls are working, not just deployed
  • Between-cycle escalation for critical issues, not held for the next monthly report

Contact us — ongoing monthly service

Full details

Service Tiers and Solution Bundles

Find the right starting point for your business size.

Select your segment to see what most organizations your size deploy and the pre-scoped bundle that covers it.

What most Micro-SMB businesses deploy

MFA + endpoint protection — the two controls required by most cyber insurance carriers.

Typical services

MFA & SSO ImplementationManaged Endpoint SecuritySecurity Posture Assessment

Start with the basics. Build on them.

Pre-scoped solution bundle

Cyber Insurance Ready

Everything your insurer requires. Fixed scope. 30 days to compliant.

Built for Micro-SMB organizations that need to obtain or renew cyber insurance. Covers every control insurers currently require as a single fixed-scope engagement.

Included services

  • Managed Identity and Access
  • Managed Endpoint Security
  • Security Awareness Training
  • Managed Backup and Data Protection
  • Incident Response Planning

Service stacks are representative. Bundle scope confirmed after a discovery call.

Integrated Security

Five layers. One integrated stack. Zero gaps between them.

Most businesses buy security tools one at a time. The result is gaps between vendors, alerts that do not correlate, and attacks that slip through. Every layer we deploy shares intelligence with every other layer.

Edge Protection

Next-gen firewalls and SD-WAN inspect every packet entering and leaving your network. Threat signatures feed the endpoint and email layers automatically.

Email Security

Sandboxing, URL isolation, and attachment inspection block phishing and BEC before they reach inboxes. High-risk users are flagged for stricter monitoring across every other layer.

Endpoint Detection

Behavioral detection and 24x7 monitoring on every device catch malware, ransomware, and lateral movement. Compromised endpoints trigger identity lockouts automatically.

Identity and Access

MFA, SSO, and conditional access policies stop credential theft from becoming a breach. Failed authentication attempts trigger endpoint scans across the stack.

Data Protection

DLP monitors and controls sensitive data movement across your environment. Data patterns feed behavioral analytics so high-risk users are watched more closely across every layer.

Why integration matters: When email security detects a phishing attempt, the high-risk user is flagged, identity requires additional verification, the endpoint increases monitoring, and data protection restricts sensitive file access. One event. Five layers respond. One compromised credential does not become a full breach.

Cyber Insurance

Get insured. Stay insured.

Cyber insurance is not optional anymore. Customers require it, lenders require it, and boards expect it. Getting coverage requires documented security controls that most organizations do not have in place.

We deploy exactly what underwriters mandate, maintain the documentation they need for renewals, and help you get covered in 12 weeks from kickoff.

What underwriters require in 2026

MFA on all accounts

Every user, every application

EDR on all endpoints

Active monitoring required, not just AV

Email security with sandboxing

URL isolation and attachment inspection

Immutable backups tested quarterly

Offline or offsite copy required

Security awareness training

Phishing simulation documented

Incident response plan

Tested annually, documented

Privileged access management

Admin accounts separately governed

Critical patches within 72 hours

Automated patch management required

Network segmentation

Sensitive systems isolated

SIEM logging with 90 day retention

Increasingly mandated for 1M coverage

Requirements vary by industry and coverage limits. These represent baseline requirements for $1M or more coverage in 2026.

Build your security programme.

We will assess your environment, identify the services that address your highest risks, and build a transparent proposal scoped to your specific situation.

Start with a bundle or build from individual services. Quote delivered within 48 hours.

View Solution Bundles