Managed Cyber Defense. Fully protected.

Managed Cyber Defense represents a comprehensive package for extensive security measures. This includes regular phishing simulations for employee sensitization, continuous Attack Surface and Darknet monitoring, an Incident Response service with a 2-hour response time, ongoing Threat Intelligence, realistic Red Teaming attacks to test defense mechanisms, as well as quarterly Cyber Security trainings, individually tailored.

Services Combined Individually!

Managed Cyber Defense

Managed Cyber Security Defense is a comprehensive protection offer for your company. It includes a Phishing Awareness Training that sensitizes and trains your employees to detect and defend against phishing attacks.

In addition, our offer includes continuous Attack Surface Monitoring, which identifies and monitors potential attack surfaces in your IT infrastructure, as well as specialized Darknet Monitoring to detect threats from the underground of the internet early on. Our Incident Response Service guarantees a quick and effective reaction and damage limitation in the event of a cyber attack, while our Threat Intelligence provides you with up-to-date information and analyses on new threats, so you are always one step ahead. Red Teaming simulates real attacks to test your security measures and identify vulnerabilities.

In addition to this, we offer regular Cyber Security Trainings to ensure that your employees are informed about the latest threats and protective measures and are well prepared. With this comprehensive security concept, we protect your company from the diverse threats of the digital world and ensure a robust and resilient IT security structure.

Illustration of security management

Various Models

We offer a range of price plans tailored to your needs and budget. Our goal is to provide you with a simple and cost-effective way to purchase our services. If you have had no previous contact with IT security, we recommend carrying out a Security Checkup.

Basic

FeatureIncluded
Threat Intelligence

Continuous monitoring of potential public vulnerabilities that could affect your systems. The scope is defined during the one-time setup and then reviewed on a quarterly basis.

Attack Surface Monitoring

Continuous monitoring of your company's external attack surface.

Darknet Monitoring

Continuous monitoring of various data sources in the clear and dark web (forums, file shares, pastebins, Discord, etc.) to detect attacks or other problems at an early stage.

Incident Response

Emergency service in the event of security incidents. Response time of 2 hours during our business hours (Mon–Fri, 8 a.m.–6 p.m.). The work of the Incident Response Team (IRT) is billed according to the time and effort required.

Not included in Basic
Phishing Awareness Training

Conduct regular spear phishing simulations to raise employee awareness.

Not included in Basic
Red Teaming

We conduct continuous attack simulations to test the effectiveness of detection methods and systems.

Not included in Basic
Cyber Security Training

Quarterly training courses tailored to your company in the field of IT security. Topics are determined jointly. Scope: 4 hours including time for questions.

Not included in Basic

Standard

FeatureIncluded
Threat Intelligence

Continuous monitoring of potential public vulnerabilities that could affect your systems. The scope is defined during the one-time setup and then reviewed on a quarterly basis.

Attack Surface Monitoring

Continuous monitoring of your company's external attack surface.

Darknet Monitoring

Continuous monitoring of various data sources in the clear and dark web (forums, file shares, pastebins, Discord, etc.) to detect attacks or other problems at an early stage.

Incident Response

Emergency service in the event of security incidents. Response time of 2 hours during our business hours (Mon–Fri, 8 a.m.–6 p.m.). The work of the Incident Response Team (IRT) is billed according to the time and effort required.

Phishing Awareness Training

Conduct regular spear phishing simulations to raise employee awareness.

Red Teaming

We conduct continuous attack simulations to test the effectiveness of detection methods and systems.

Not included in Standard
Cyber Security Training

Quarterly training courses tailored to your company in the field of IT security. Topics are determined jointly. Scope: 4 hours including time for questions.

Not included in Standard

Enterprise

FeatureIncluded
Threat Intelligence

Continuous monitoring of potential public vulnerabilities that could affect your systems. The scope is defined during the one-time setup and then reviewed on a quarterly basis.

Attack Surface Monitoring

Continuous monitoring of your company's external attack surface.

Darknet Monitoring

Continuous monitoring of various data sources in the clear and dark web (forums, file shares, pastebins, Discord, etc.) to detect attacks or other problems at an early stage.

Incident Response

Emergency service in the event of security incidents. Response time of 2 hours during our business hours (Mon–Fri, 8 a.m.–6 p.m.). The work of the Incident Response Team (IRT) is billed according to the time and effort required.

Phishing Awareness Training

Conduct regular spear phishing simulations to raise employee awareness.

Red Teaming

We conduct continuous attack simulations to test the effectiveness of detection methods and systems.

Cyber Security Training

Quarterly training courses tailored to your company in the field of IT security. Topics are determined jointly. Scope: 4 hours including time for questions.

References

Toyota
dkb
R+V BKK
State Bank of India
Clark
Metzler

Certificates

ISO 27001 Grundschutz
OSCP

Contact

Curious? Convinced? Interested?

Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment:

Please send me the free sample report.
Please send me more information.
I would like to subscribe to the newsletter and receive further information at the email address provided.
I consent to the use and processing of my personal data provided for the purpose of handling my inquiry.*