Managed Cyber Defense. Fully protected.
Managed Cyber Defense represents a comprehensive package for extensive security measures. This includes regular phishing simulations for employee sensitization, continuous Attack Surface and Darknet monitoring, an Incident Response service with a 2-hour response time, ongoing Threat Intelligence, realistic Red Teaming attacks to test defense mechanisms, as well as quarterly Cyber Security trainings, individually tailored.
Services Combined Individually!
Managed Cyber Defense
Managed Cyber Security Defense is a comprehensive protection offer for your company. It includes a Phishing Awareness Training that sensitizes and trains your employees to detect and defend against phishing attacks.
In addition, our offer includes continuous Attack Surface Monitoring, which identifies and monitors potential attack surfaces in your IT infrastructure, as well as specialized Darknet Monitoring to detect threats from the underground of the internet early on. Our Incident Response Service guarantees a quick and effective reaction and damage limitation in the event of a cyber attack, while our Threat Intelligence provides you with up-to-date information and analyses on new threats, so you are always one step ahead. Red Teaming simulates real attacks to test your security measures and identify vulnerabilities.
In addition to this, we offer regular Cyber Security Trainings to ensure that your employees are informed about the latest threats and protective measures and are well prepared. With this comprehensive security concept, we protect your company from the diverse threats of the digital world and ensure a robust and resilient IT security structure.
Various Models
We offer a range of price plans tailored to your needs and budget. Our goal is to provide you with a simple and cost-effective way to purchase our services. If you have had no previous contact with IT security, we recommend carrying out a Security Checkup.
Basic
| Feature | Included |
|---|---|
Threat Intelligence Continuous monitoring of potential public vulnerabilities that could affect your systems. The scope is defined during the one-time setup and then reviewed on a quarterly basis. | |
Attack Surface Monitoring Continuous monitoring of your company's external attack surface. | |
Darknet Monitoring Continuous monitoring of various data sources in the clear and dark web (forums, file shares, pastebins, Discord, etc.) to detect attacks or other problems at an early stage. | |
Incident Response Emergency service in the event of security incidents. Response time of 2 hours during our business hours (Mon–Fri, 8 a.m.–6 p.m.). The work of the Incident Response Team (IRT) is billed according to the time and effort required. | Not included in Basic |
Phishing Awareness Training Conduct regular spear phishing simulations to raise employee awareness. | Not included in Basic |
Red Teaming We conduct continuous attack simulations to test the effectiveness of detection methods and systems. | Not included in Basic |
Cyber Security Training Quarterly training courses tailored to your company in the field of IT security. Topics are determined jointly. Scope: 4 hours including time for questions. | Not included in Basic |
Standard
| Feature | Included |
|---|---|
Threat Intelligence Continuous monitoring of potential public vulnerabilities that could affect your systems. The scope is defined during the one-time setup and then reviewed on a quarterly basis. | |
Attack Surface Monitoring Continuous monitoring of your company's external attack surface. | |
Darknet Monitoring Continuous monitoring of various data sources in the clear and dark web (forums, file shares, pastebins, Discord, etc.) to detect attacks or other problems at an early stage. | |
Incident Response Emergency service in the event of security incidents. Response time of 2 hours during our business hours (Mon–Fri, 8 a.m.–6 p.m.). The work of the Incident Response Team (IRT) is billed according to the time and effort required. | |
Phishing Awareness Training Conduct regular spear phishing simulations to raise employee awareness. | |
Red Teaming We conduct continuous attack simulations to test the effectiveness of detection methods and systems. | Not included in Standard |
Cyber Security Training Quarterly training courses tailored to your company in the field of IT security. Topics are determined jointly. Scope: 4 hours including time for questions. | Not included in Standard |
Enterprise
| Feature | Included |
|---|---|
Threat Intelligence Continuous monitoring of potential public vulnerabilities that could affect your systems. The scope is defined during the one-time setup and then reviewed on a quarterly basis. | |
Attack Surface Monitoring Continuous monitoring of your company's external attack surface. | |
Darknet Monitoring Continuous monitoring of various data sources in the clear and dark web (forums, file shares, pastebins, Discord, etc.) to detect attacks or other problems at an early stage. | |
Incident Response Emergency service in the event of security incidents. Response time of 2 hours during our business hours (Mon–Fri, 8 a.m.–6 p.m.). The work of the Incident Response Team (IRT) is billed according to the time and effort required. | |
Phishing Awareness Training Conduct regular spear phishing simulations to raise employee awareness. | |
Red Teaming We conduct continuous attack simulations to test the effectiveness of detection methods and systems. | |
Cyber Security Training Quarterly training courses tailored to your company in the field of IT security. Topics are determined jointly. Scope: 4 hours including time for questions. |
| Basic | Standard | Enterprise | |
|---|---|---|---|
Threat Intelligence Continuous monitoring of potential public vulnerabilities that could affect your systems. The scope is defined during the one-time setup and then reviewed on a quarterly basis. | |||
Attack Surface Monitoring Continuous monitoring of your company's external attack surface. | |||
Darknet Monitoring Continuous monitoring of various data sources in the clear and dark web (forums, file shares, pastebins, Discord, etc.) to detect attacks or other problems at an early stage. | |||
Incident Response Emergency service in the event of security incidents. Response time of 2 hours during our business hours (Mon–Fri, 8 a.m.–6 p.m.). The work of the Incident Response Team (IRT) is billed according to the time and effort required. | Not included in Basic | ||
Phishing Awareness Training Conduct regular spear phishing simulations to raise employee awareness. | Not included in Basic | ||
Red Teaming We conduct continuous attack simulations to test the effectiveness of detection methods and systems. | Not included in Basic | Not included in Standard | |
Cyber Security Training Quarterly training courses tailored to your company in the field of IT security. Topics are determined jointly. Scope: 4 hours including time for questions. | Not included in Basic | Not included in Standard |
Range of Services for Cyber Security
Additional Valuable Services within the Scope of Managed Cyber Defense
- Penetration Test
Penetration tests are simulated attacks from external or internal sources to determine the security of web applications, apps, networks, and infrastructures and to reveal any vulnerabilities.
- Cloud Security
Due to the increasing complexity of cloud infrastructures, many services are incorrectly configured. We help you identify and eliminate misconfigurations and their effects.
- Static Code Analysis
Static code analysis, also known as source code analysis, is typically carried out as part of a code review and takes place during the implementation phase of a Security Development Lifecycle (SDL).
- External CISO
An external CISO monitors and reviews a company's information security. They are responsible for the development, implementation, and monitoring of policies and procedures.
Contact
Curious? Convinced? Interested?
Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment:









