Our Price list and functions
Pricing
Explore our packages or contact us to discuss your needs
Contact for pricing
All the Functions You Get with Cyber Detector
Discover the full suite of features and capabilities that Cyber Detector brings to your enterprise cybersecurity solution. Get insights into comprehensive tools such as Next-Gen SIEM, real-time monitoring, vulnerability management, 24/7 support, and more.
Cyber Detector provides a robust platform to safeguard your digital infrastructure with advanced threat detection, automated alerts, and seamless integration for a secure, streamlined experience.
Standard
-
Up to 25 Employees 310 €
-
Up to 35 Employees 400 €
-
Up to 50 Employees 470 €
-
Up to 65 Employees 600 €
-
Up to 80 Employees 700 €
-
Up to 100 Employees 800 €
-
Up to 125 Employees 900 €
-
Up to 150 Employees 1100 €
-
Up to 200 Employees 1300 €
-
Up to 250 Employees 1400 €
-
Up to 300 Employees 1600€
-
Up to 400 Employees 1750 €
-
400+ Employees contact us
Professional
-
Up to 25 Employees 400 €
-
Up to 35 Employees 500 €
-
Up to 50 Employees 600 €
-
Up to 65 Employees 750 €
-
Up to 80 Employees 900 €
-
Up to 100 Employees 1000 €
-
Up to 125 Employees 1100 €
-
Up to 150 Employees 1350 €
-
Up to 200 Employees 1600 €
-
Up to 250 Employees 1750 €
-
Up to 300 Employees 2000 €
-
Up to 400 Employees 2200 €
-
400+ Employees contact us
Enterprise
-
Up to 25 Employees 450 €
-
Up to 35 Employees 600 €
-
Up to 50 Employees 700 €
-
Up to 65 Employees 850 €
-
Up to 80 Employees 1000 €
-
Up to 100 Employees 1100 €
-
Up to 125 Employees 1250 €
-
Up to 150 Employees 1500 €
-
Up to 200 Employees 1800 €
-
Up to 250 Employees 2000 €
-
Up to 300 Employees 2250 €
-
Up to 400 Employees 2500 €
-
400+ Employees contact us
Everything For One Price
We have chosen to offer cybersecurity solutions to businesses of all sizes, with a focus on transparency and comprehensive functionality at an enterprise system. We provide 24/7 personalized support, ensuring our customers always feel secure and well-informed.
Up to 62 Assets.
Up to 87 Assets.
Up to 125 Assets.
Up to 162 Assets.
Up to 200 Assets.
Up to 250 Assets.
Up to 312 Assets.
Up to 375 Assets.
Up to 500 Assets.
Up to 625 Assets.
Up to 750 Assets.
Up to 1000 Assets.
Contact Us To Discuss The Price
All The Functions You Get With Cyber Detector
All The Functions You Get With Cyber Detector
Get an overview of all the features and details that Cyber Detecter offers in their cybersecurity enterprise system.
Functions
Firewall logs record all traffic attempting to pass through network boundaries. These logs contain details of allowed and blocked connection attempts, including source and destination IP addresses, ports, and protocols used, as well as timestamps of the events.
Switch logs track traffic within a local area network (LAN) and help manage the network’s performance and security.
Microsoft 365 logs provide insights into user activities on the platform, including logins, email traffic, file access and changes, and use of collaboration tools such as Teams and SharePoint.
Active Directory logs contain detailed information about user account logins, changes in access rights, creation and deletion of objects (such as users, groups, and computers), and administrative events.
Windows Server logs contain a wide range of data about server operation, security, and performance.
Windows Client logs track activities on end-user devices, including user logins, system changes, software installations, and potential security incidents such as malware detection or failed login attempts.
Event Logs record system and application events on devices, ranging from informational messages to warnings and critical errors.
Security Logs focus on security-related events such as login attempts, changes in security settings, and failed attempts to access system resources.
This function involves a thorough analysis of logs using a tailored rule set designed to detect specific patterns, irregularities, or security threats.
This function focuses on reporting all detected anomalies and security incidents with detailed prioritization based on the threat level.
Vulnerability Management as a Service
Vulnerability Management as a Service
Vulnerability Management as a Service (VMaaS) is an essential element of a robust cybersecurity framework. It involves systematically identifying, assessing, and mitigating security vulnerabilities across an organization’s digital infrastructure.
VMaaS provides ongoing monitoring and analysis of all software applications and systems within the organization’s environment. This continuous assessment ensures that any newly discovered vulnerabilities are promptly identified.
The service includes comprehensive scanning of all connected devices and network components, such as servers, endpoints, routers, and IoT devices.
To ensure the most accurate and up-to-date vulnerability information, VMaaS integrates with multiple Common Vulnerabilities and Exposures (CVE) databases.
Once vulnerabilities are identified, VMaaS evaluates their severity and potential impact using a standardized scoring system.
The Cyber Detector Appliance is a specialized tool used for conducting internal network scans. It provides detailed analysis and insights into the internal environment, identifying vulnerabilities within the organization’s local network that might not be exposed to external threats but could be exploited by insiders or malware.
For external-facing assets, VMaaS employs the Cyber Detector Cloud Appliance to perform thorough scans of external IP addresses. This tool focuses on identifying vulnerabilities in public-facing components, such as web servers, cloud environments, and internet-exposed applications, which are often the primary targets for external attacks.
SOC as a Service
This aspect involves transferring the responsibility of managing and securing IT infrastructure from the organization’s internal team to Cyber Detector.
A critical feature of SOCaaS is the provision of round-the-clock monitoring and response capabilities.
Just-in-time reporting refers to the immediate generation of reports when an incident is detected.
Cyber Detector conducts regular audits to assess the security posture of the client’s environment.
As part of the service, the SOC team at Cyber Detector develops and manages various security tasks on behalf of the client.
The JIRA Security Platform is a tool provided by Cyber Detector for tracking and managing security incidents, tasks, and projects.
Beyond identifying vulnerabilities and providing recommendations, Cyber Detector actively supports clients in implementing security best practices.
The SOC team utilizes Security Information and Event Management (SIEM) systems to collect and analyze data from various sources within the client’s IT environment.
With the data gathered by SIEM and vulnerability management tools, the SOC team performs continuous real-time evaluations.
Organizations gain access to highly skilled security professionals who are experts in detecting and responding to cybersecurity threats.
By outsourcing security operations, companies avoid the high costs associated with building and maintaining an in-house SOC.
o SOCaaS allows organizations to scale their security operations according to their needs. As the business grows or security requirements change, the service can be adjusted accordingly without the need for significant additional investment.
The continuous monitoring and proactive approach of SOCaaS help in detecting and mitigating threats before they can impact the organization.
SOCaaS providers often have deep knowledge of regulatory requirements and can help organizations maintain compliance with standards such as GDPR, HIPAA, PCI DSS, etc.
Contact Us
Get In Touch
Get a free demo or reach out to us regarding any questions that you might have