Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
This is our basic package , designed with the intent to provide an external perspective of what vulnerabilities can be exploited by threat actors fully external to your environment.
Starting at 35 Devices
Network appliances includ.
This package offering includes:
Scheduled External Vulnerability Scans
Scheduled Internal Vulnerability Scans
Reporting provided includes:
Bi-Weekly Reports on the vulnerabilities collected
Metric reporting on effective our scanning coverage
This package give you detailed insight into your organizations attack surface, including all hardware and software that your organization uses. This is best for organizations that are interested in continually assessing their environment on the ability to maintain and update their IT infrastructure.
This package is geared toward medium-sized Environments.
This package offering includes:
Scheduled External Vulnerability Scans
Scheduled Internal Vulnerability Scans
External Website Application Scanning of your organization's public facing website applications.
Reporting provided includes:
Bi-Weekly Reports on the vulnerabilities collected
Metric reporting on effective our scanning coverage
This is our full Vulnerability Management service offering that gives a comprehensive and detailed look into the attack surface that your organization holds, providing and tracking prioritized remediation plans. This package is designed to provide your organization with the tools and information to build out your vulnerability and compliance management program.
This package is geared toward large Environments.
This package offering includes:
Scheduled External Vulnerability Scans Scheduled Internal Vulnerability Scans
External Website Application Scanning
Internal Website Application Scanning
The Titanium Package offers:
Including Compliance Vulnerability Mapping (HIPAA, PCI-DSS, CMMC, Etc.)
Reporting in this package offering includes:
Bi-Weekly Reports on the identified vulnerabilities
Metric reporting on effective scanning coverage Optimized Remediation Plan tailored to your organizations vulnerabilities.
Note: The Remediation Plan is tracked to completion with a designated timeline and milestones that must be met to complete the remediation.
Each of the above packages can be purchased as is or tailored to fit your business needs. All rates can be negotiated once we have completed the introductory meeting and have designed your tailored service offering.
Copyright © 2022 Trusect Corporation - All Rights Reserved.
We are grateful you made it to Trusect! Book your consultation today!