top of page

Our service packages - Phishing


START

Ensure your business is compliant with NIS 2 with our comprehensive compliance review. Get expert advice to mitigate risks.

  • ✅ NIS2 Compliance Check


BASIC

Try the BASIC plan, which includes a NIS2 compliance check and a basic phishing test to effectively protect your business from cyber threats.

  • ✅ NIS2 Compliance Check

  • 📨 Online phishing form

  • 🎯 1 phishing campaign

  • 🧰 1 phishing email template

  • 👥 Less than 20 users


STANDARD

The Standard plan includes comprehensive NIS2 compliance checking and advanced anti-phishing protection, ensuring your business is secure and compliant.

  • ✅ NIS2 Compliance Check

  • 📨 Online phishing form

  • 📎 Test attached files

  • 🎯 3 phishing campaigns

  • 🧰 5 phishing email templates

  • 👥 For 30-50 users


PREMIUM

Try our PREMIUM plan, which includes NIS2 compliance checks and comprehensive phishing tests. For companies in higher NI2 regime.

  • ✅ NIS2 Compliance Check

  • 📨 Online phishing form

  • 📎 Test attached files

  • 🧾 Dangerous Invoice Test

  • 📞 Call test (vishing / mystery call)

  • 🎯 10 phishing campaigns

  • 🎨 Individual templates

  • 👥 Unlimited number of users

Our service packages - 3rd party Vulnerability testing


START

An entry-level package providing fast visibility into third-party cyber risks using automated scans and publicly available data.

  • Monitoring of Trust & Security pages

  • Automated external scanning (web, domain, basic network exposure)

  • Detection of common vulnerabilities (web, DNS, TLS, open ports)

  • Basic dashboard

    • Current risk score

    • Findings overview

  • Core supplier details

    • Name, domain, geolocation


BASIC

An extended package for ongoing third-party risk management, including phishing exposure, email security and trend monitoring.

  • Everything in Essential

  • Advanced network & application security scans

    • DMARC, DNS, TLS, web server

  • Phishing & malware exposure monitoring

  • Email security assessment

  • Website & domain security

  • Dashboard

    • Incident likelihood assessment

    • Risk trends over time

  • Extended asset inventory

    • IP / IP ranges

    • Subdomains


STANDARD

A comprehensive solution for organizations requiring deep supplier insights, active vendor engagement and managed remediation.

  • Everything in Advanced

  • Security questionnaires

    • AI-assisted question builder

    • Questionnaire evidence tracking

  • Additional security evidence

    • Certifications, policies, documentation

  • Extended risk domains

    • Brand & reputation

    • Organizational security (incident hotline)

  • Remediation planning

    • Internal task management

    • Supplier-visible remediation tasks

  • Supplier escalation workflows


PREMIUM

An enterprise-grade solution delivering end-to-end third-party risk management, supplier onboarding and expert-validated assessments.

  • Everything in Professional

  • Supplier onboarding workflow

    • Supplier search (VAT, domain, URL)

    • Automatic logo retrieval

    • Checklist & scan scope definition

  • Automated and expert-led assessments

  • Audit-ready reports

  • Advanced dashboard

    • Questionnaire monitoring

    • Remediation task tracking

    • Historical risk changes

  • Approval workflows

    • Dedicated approver

  • Assessment results

    • Onboarding within 72 hours

    • Reviewed by a security expert

Our service packages - Insider Threat Protection


START

An entry-level package designed to detect early signs of insider threats and protect sensitive data with minimal operational impact.

  • Core insider threat detection

    • File size monitoring

    • File upload detection

    • Printing activity monitoring

    • Basic keystroke analytics

  • Policy violation detection

  • Essential alerting

  • Basic dashboard

    • Incident overview

    • Current risk status


BASIC

An extended package combining insider threat detection with detailed activity monitoring and productivity insights.

  • Everything in Essential

  • Advanced activity monitoring

    • Screen recording

    • Keystrokes

    • Activity by application and web domain

  • Productivity risk detection

    • Idle time

    • Non-work related time

  • Live user monitoring

  • File transfer monitoring

  • Behaviour trends dashboard


STANDARD

A comprehensive package delivering AI-powered analytics, contextual insights and automated alert triage.

  • Everything in Advanced

  • AI usage monitoring

    • Hours spent using AI

    • Documents uploaded to AI tools

  • Phishing Simulation Agent

  • Abuse Mailbox Agent

  • Advanced communications analysis

  • Meeting analytics

    • 1:1s, overlaps, after-hours and long meetings

  • OCR content analysis

  • Triage Agent

    • Automated alert analysis

    • False positive reduction

    • Critical incident prioritisation


PREMIUM

An enterprise-grade solution combining insider threat protection, workforce intelligence and expert-validated security operations.

  • Everything in Professional

  • Advanced DLP and insider threat protection

  • Behavioural relationship analytics

    • Demographic relationship graphs

    • Risk cluster identification

  • Geolocation intelligence

    • On-site vs remote engagement

    • Office-by-office comparison

  • Centralised policy and rules management

  • Advanced incident response workflows

  • Audit-ready reporting

  • Optional expert review and validation

bottom of page