A | B | C | D | |
---|---|---|---|---|
1 | Service Features | Startup | Professional | Elite |
2 | Awareness & Training | |||
3 | IS Awareness Programs | β | β | β |
4 | Standard and compliance-aligned awareness for all employees | β | β | β |
5 | Tailored awareness sessions for regulations and compliance | β | β | β |
6 | Annual effectiveness measurement of awareness campaigns | β | β | β |
7 | Phishing Security Tests and Simulated Phishing Campaigns | β | β | β |
8 | Automated Security Awareness Program (ASAP) | β | β | β |
9 | Advanced Reporting and Metrics | β | β | β |
10 | Security 'Hints & Tips' Newsletters | β | β | β |
11 | Access to +190 courses and career paths | β | β | β |
12 | New courses and live workshops added every quarter | β | β | β |
13 | Specialized training for technical, security, and business teams | β | β | β |
14 | Standard & Compliance | |||
15 | Creation and Review of Policies and Procedures | β | β | β |
16 | Risk Management Framework Creation and Review | β | β | β |
17 | Continuous Risk Assessment Updates | β | β | β |
18 | Information Security Auditing | β | β | β |
19 | Compliance Auditing for Standards (ISO, GDPR,PDPL, HIPAA,ISR,NCA, etc.) | β | β | β |
20 | Incident Response Planning and Tests | β | β | β |
21 | Compliance Training and Workshops | β | β | β |
22 | Vendor and Third-party Risk Management | β | β | β |
23 | Legal Compliance Review (Data Privacy Laws, etc.) | β | β | β |
24 | Security Architecture Review and Consulting | β | β | β |
25 | Security Assessment | |||
26 | Cloud / IoT Security Assessment | β | β | β |
27 | SOC Maturity Evaluation | β | β | β |
28 | Application Security Assessment | β | β | β |
29 | Zero Trust Security Assessment | β | β | β |
30 | Annual Vulnerability Assessment and Penetration Testing (VA/PT) | β | β | β |
31 | Network Security Assessment | β | β | β |
32 | Compliance Assessment for Security Standards | β | β | β |
33 | Threat Modeling and Analysis | β | β | β |
34 | Security Posture Review and Recommendations | β | β | β |