Our Price list and functions

Pricing

Explore our packages or contact us to discuss your needs

Contact for pricing

All the Functions You Get with Cyber Detector

Discover the full suite of features and capabilities that Cyber Detector brings to your enterprise cybersecurity solution. Get insights into comprehensive tools such as Next-Gen SIEM, real-time monitoring, vulnerability management, 24/7 support, and more.

Cyber Detector provides a robust platform to safeguard your digital infrastructure with advanced threat detection, automated alerts, and seamless integration for a secure, streamlined experience.

Standard

Monthly Basis
  • Up to 25 Employees 310 €
  • Up to 35 Employees 400 €
  • Up to 50 Employees 470 €
  • Up to 65 Employees 600 €
  • Up to 80 Employees 700 €
  • Up to 100 Employees 800 €
  • Up to 125 Employees 900 €
  • Up to 150 Employees 1100 €
  • Up to 200 Employees 1300 €
  • Up to 250 Employees 1400 €
  • Up to 300 Employees 1600€
  • Up to 400 Employees 1750 €
  • 400+ Employees contact us

Professional

Monthly Basis
  • Up to 25 Employees 400 €
  • Up to 35 Employees 500 €
  • Up to 50 Employees 600 €
  • Up to 65 Employees 750 €
  • Up to 80 Employees 900 €
  • Up to 100 Employees 1000 €
  • Up to 125 Employees 1100 €
  • Up to 150 Employees 1350 €
  • Up to 200 Employees 1600 €
  • Up to 250 Employees 1750 €
  • Up to 300 Employees 2000 €
  • Up to 400 Employees 2200 €
  • 400+ Employees contact us
20% First Year

Enterprise

Monthly Basis
  • Up to 25 Employees 450 €
  • Up to 35 Employees 600 €
  • Up to 50 Employees 700 €
  • Up to 65 Employees 850 €
  • Up to 80 Employees 1000 €
  • Up to 100 Employees 1100 €
  • Up to 125 Employees 1250 €
  • Up to 150 Employees 1500 €
  • Up to 200 Employees 1800 €
  • Up to 250 Employees 2000 €
  • Up to 300 Employees 2250 €
  • Up to 400 Employees 2500 €
  • 400+ Employees contact us
24/7 Support
Professional
Enterprise
Firewall Activities
Switch Activities
Microsoft 365
Azure AD
VPN
Exchange
Active Directory
LDAP
VPN
Windows Server Logs
Windows Client Logs
Event Logs
Security Logs
DNS Logs
DHCP Logs
Logfile Analysis
Deviation Reporting
Vulnerability Management as a Service
Continuous Software Vulnerability Assessment
Active Scanning of All Connected Assets
Integration with Multiple CVE Databases
Prioritization Using a Scoring System
Internal Network Scans with Cyber Detector Appliance
External IP Address Scanning with Cyber Detector Cloud Appliance
Outsourcing of IT Security to Cyber Detector
24/7 Personal Security Service
Just-in-Time Reporting in Case of Incidents
Regular Security Best Practice Audit Reports
Development/Management of Security Tasks
Access to the Cyber Detector JIRA Security Platform
Support in the Implementation of Security Best Practice Tasks
SIEM and Vulnerability Management
Real-Time Evaluation and Action
Expertise and Specialization
Cost-Effectiveness
Scalability
Proactive Threat Management
Compliance and Reporting

Everything For One Price

We have chosen to offer cybersecurity solutions to businesses of all sizes, with a focus on transparency and comprehensive functionality at an enterprise system. We provide 24/7 personalized support, ensuring our customers always feel secure and well-informed.

All The Functions You Get With Cyber Detector

All The Functions You Get With Cyber Detector

Get an overview of all the features and details that Cyber Detecter offers in their cybersecurity enterprise system.

Functions

Firewall logs record all traffic attempting to pass through network boundaries. These logs contain details of allowed and blocked connection attempts, including source and destination IP addresses, ports, and protocols used, as well as timestamps of the events. 

Switch logs track traffic within a local area network (LAN) and help manage the network’s performance and security.

Microsoft 365 logs provide insights into user activities on the platform, including logins, email traffic, file access and changes, and use of collaboration tools such as Teams and SharePoint.

Azure Active Directory (AzureAD) logs record activities related to user and group management, authentication, and security incidents in Microsoft’s cloud services.

VPN logs contain data about remote access to the network, including user logins, session duration, assigned IP addresses, and the amount of data transferred.

Exchange logs record email activities across the organization’s email servers. These logs contain information on sent and received emails, mailbox access attempts, configuration changes, and detection logs for spam and malware.

Active Directory logs contain detailed information about user account logins, changes in access rights, creation and deletion of objects (such as users, groups, and computers), and administrative events.

LDAP logs record queries and responses related to directory services used to manage user and resource data across the network.

Windows Server logs contain a wide range of data about server operation, security, and performance.

Windows Client logs track activities on end-user devices, including user logins, system changes, software installations, and potential security incidents such as malware detection or failed login attempts.

Event Logs record system and application events on devices, ranging from informational messages to warnings and critical errors.

Security Logs focus on security-related events such as login attempts, changes in security settings, and failed attempts to access system resources.

DNS logs record all queries and responses processed by the DNS server. These logs contain information about domain names, IP addresses, queries, responses, and any error messages.

DHCP logs record the allocation and renewal of IP addresses to devices on the network. These logs contain information about IP address requests, assigned addresses, lease durations, and errors in the allocation process.

This function involves a thorough analysis of logs using a tailored rule set designed to detect specific patterns, irregularities, or security threats.

This function focuses on reporting all detected anomalies and security incidents with detailed prioritization based on the threat level.

Vulnerability Management as a Service

Vulnerability Management as a Service

Vulnerability Management as a Service (VMaaS) is an essential element of a robust cybersecurity framework. It involves systematically identifying, assessing, and mitigating security vulnerabilities across an organization’s digital infrastructure.

VMaaS provides ongoing monitoring and analysis of all software applications and systems within the organization’s environment. This continuous assessment ensures that any newly discovered vulnerabilities are promptly identified.

The service includes comprehensive scanning of all connected devices and network components, such as servers, endpoints, routers, and IoT devices.

To ensure the most accurate and up-to-date vulnerability information, VMaaS integrates with multiple Common Vulnerabilities and Exposures (CVE) databases.

Once vulnerabilities are identified, VMaaS evaluates their severity and potential impact using a standardized scoring system.

The Cyber Detector Appliance is a specialized tool used for conducting internal network scans. It provides detailed analysis and insights into the internal environment, identifying vulnerabilities within the organization’s local network that might not be exposed to external threats but could be exploited by insiders or malware.

For external-facing assets, VMaaS employs the Cyber Detector Cloud Appliance to perform thorough scans of external IP addresses. This tool focuses on identifying vulnerabilities in public-facing components, such as web servers, cloud environments, and internet-exposed applications, which are often the primary targets for external attacks.

SOC as a Service

This aspect involves transferring the responsibility of managing and securing IT infrastructure from the organization’s internal team to Cyber Detector.

A critical feature of SOCaaS is the provision of round-the-clock monitoring and response capabilities.

Just-in-time reporting refers to the immediate generation of reports when an incident is detected.

Cyber Detector conducts regular audits to assess the security posture of the client’s environment.

As part of the service, the SOC team at Cyber Detector develops and manages various security tasks on behalf of the client.

The JIRA Security Platform is a tool provided by Cyber Detector for tracking and managing security incidents, tasks, and projects.

Beyond identifying vulnerabilities and providing recommendations, Cyber Detector actively supports clients in implementing security best practices.

The SOC team utilizes Security Information and Event Management (SIEM) systems to collect and analyze data from various sources within the client’s IT environment.

With the data gathered by SIEM and vulnerability management tools, the SOC team performs continuous real-time evaluations.

Organizations gain access to highly skilled security professionals who are experts in detecting and responding to cybersecurity threats.

By outsourcing security operations, companies avoid the high costs associated with building and maintaining an in-house SOC.

o SOCaaS allows organizations to scale their security operations according to their needs. As the business grows or security requirements change, the service can be adjusted accordingly without the need for significant additional investment.

The continuous monitoring and proactive approach of SOCaaS help in detecting and mitigating threats before they can impact the organization.

SOCaaS providers often have deep knowledge of regulatory requirements and can help organizations maintain compliance with standards such as GDPR, HIPAA, PCI DSS, etc.

Contact Us

Get In Touch

Get a free demo or reach out to us regarding any questions that you might have