
Our service packages - Phishing
STANDARD
The Standard plan includes comprehensive NIS2 compliance checking and advanced anti-phishing protection, ensuring your business is secure and compliant.
-
✅ NIS2 Compliance Check
-
📨 Online phishing form
-
📎 Test attached files
-
🎯 3 phishing campaigns
-
🧰 5 phishing email templates
-
👥 For 30-50 users
-
PREMIUM
Try our PREMIUM plan, which includes NIS2 compliance checks and comprehensive phishing tests. For companies in higher NI2 regime.
-
✅ NIS2 Compliance Check
-
📨 Online phishing form
-
📎 Test attached files
-
🧾 Dangerous Invoice Test
-
📞 Call test (vishing / mystery call)
-
🎯 10 phishing campaigns
-
🎨 Individual templates
-
👥 Unlimited number of users
Our service packages - 3rd party Vulnerability testing
START
An entry-level package providing fast visibility into third-party cyber risks using automated scans and publicly available data.
-
Monitoring of Trust & Security pages
-
Automated external scanning (web, domain, basic network exposure)
-
Detection of common vulnerabilities (web, DNS, TLS, open ports)
-
Basic dashboard
-
Current risk score
-
Findings overview
-
-
Core supplier details
-
Name, domain, geolocation
-
BASIC
An extended package for ongoing third-party risk management, including phishing exposure, email security and trend monitoring.
-
Everything in Essential
-
Advanced network & application security scans
-
DMARC, DNS, TLS, web server
-
-
Phishing & malware exposure monitoring
-
Email security assessment
-
Website & domain security
-
Dashboard
-
Incident likelihood assessment
-
Risk trends over time
-
-
Extended asset inventory
-
IP / IP ranges
-
Subdomains
-
STANDARD
A comprehensive solution for organizations requiring deep supplier insights, active vendor engagement and managed remediation.
-
Everything in Advanced
-
Security questionnaires
-
AI-assisted question builder
-
Questionnaire evidence tracking
-
-
Additional security evidence
-
Certifications, policies, documentation
-
-
Extended risk domains
-
Brand & reputation
-
Organizational security (incident hotline)
-
-
Remediation planning
-
Internal task management
-
Supplier-visible remediation tasks
-
-
Supplier escalation workflows
-
PREMIUM
An enterprise-grade solution delivering end-to-end third-party risk management, supplier onboarding and expert-validated assessments.
-
Everything in Professional
-
Supplier onboarding workflow
-
Supplier search (VAT, domain, URL)
-
Automatic logo retrieval
-
Checklist & scan scope definition
-
-
Automated and expert-led assessments
-
Audit-ready reports
-
Advanced dashboard
-
Questionnaire monitoring
-
Remediation task tracking
-
Historical risk changes
-
-
Approval workflows
-
Dedicated approver
-
-
Assessment results
-
Onboarding within 72 hours
-
Reviewed by a security expert
-
Our service packages - Insider Threat Protection
START
An entry-level package designed to detect early signs of insider threats and protect sensitive data with minimal operational impact.
-
Core insider threat detection
-
File size monitoring
-
File upload detection
-
Printing activity monitoring
-
Basic keystroke analytics
-
-
Policy violation detection
-
Essential alerting
-
Basic dashboard
-
Incident overview
-
Current risk status
-
BASIC
An extended package combining insider threat detection with detailed activity monitoring and productivity insights.
-
Everything in Essential
-
Advanced activity monitoring
-
Screen recording
-
Keystrokes
-
Activity by application and web domain
-
-
Productivity risk detection
-
Idle time
-
Non-work related time
-
-
Live user monitoring
-
File transfer monitoring
-
Behaviour trends dashboard
STANDARD
A comprehensive package delivering AI-powered analytics, contextual insights and automated alert triage.
-
Everything in Advanced
-
AI usage monitoring
-
Hours spent using AI
-
Documents uploaded to AI tools
-
-
Phishing Simulation Agent
-
Abuse Mailbox Agent
-
Advanced communications analysis
-
Meeting analytics
-
1:1s, overlaps, after-hours and long meetings
-
-
OCR content analysis
-
Triage Agent
-
Automated alert analysis
-
False positive reduction
-
Critical incident prioritisation
-
-
PREMIUM
An enterprise-grade solution combining insider threat protection, workforce intelligence and expert-validated security operations.
-
Everything in Professional
-
Advanced DLP and insider threat protection
-
Behavioural relationship analytics
-
Demographic relationship graphs
-
Risk cluster identification
-
-
Geolocation intelligence
-
On-site vs remote engagement
-
Office-by-office comparison
-
-
Centralised policy and rules management
-
Advanced incident response workflows
-
Audit-ready reporting
-
Optional expert review and validation
