Pricing
iSecureX
Pricing Plans
Cloud VPN/SASE/SD-WAN enablement
Per User/ Monthly/Annual Subscriptions
- Ideal solution for SMB. Highly scalable to Enterprise and Telco Retail segments.
- Check Point Harmony SASE
- Cloud Flare ZTNA/Magic WAN
- Other SSE vendors-Fortinet. Netskope. Palo Alto
- Secure Web Gateway product for Internet access.
- Remote Access product supports both client and clientless features from a single application portal for users.
- Add on products for Browser Security and SaaS security
- Powerful ZTNA CASB/DLP features.
- Threat prevention and Zero Day protection by Default
- Seamless Integration with customer network via Automation.
- Integration with On-Prem/Cloud-based SD-WAN of your choice.
- Min 10/50 users based on vendor Max No Limit
- Products can be purchased separately or Bundled options available for respective vendors.
Workspace Security enablement
Per User/ Monthly/Annual Subscriptions
- Ideal solution for SMB. Scalable to Enterprise and Telco Retail segments.
- SentinelOne Endpoint Security
- Check Point Harmony
Features :- Email Security product
- Mobile Security product
- Browser Security product
- SaaS security product (SSPM)
- Products can be purchased separately or Bundled options available for respective vendors.
- SentinelOne Endpoint protection can be bundled with Guardz Unified Detection and Response product.
Cloud Security enablement
Per Asset/ Monthly/Annual Subscriptions
- Ideal solution for SMB’s involved in Cloud based development and SaaS. High scalability to Enterprise and Telco Retail segments
- Snyk
- Tenable
- Check Point CloudGuard
- CSPM
- Code Security
- Cloud Workload Protection
- CIEM
- WAF
- Virtual Firewall
- IAM Control
- Cloud Security Posture Management Cloud Infrastructure and Entitlement Management
- Web Application Firewall
- Products can be purchased separately or Bundled options available for respective vendors.
Unified Detection and Response enablement
Per User/ Monthly/Annual Subscriptions
- Ideal solution for SMB. Highly scalable to Enterprise and Telco Retail segments.
Capabilities:
- Guardz
- Wazuh
- Automated remediations of faults
- Dark and external footprint monitoring
- Endpoint security
- Email security
- Risk analysis
- Comprehensive Reports
Risk Management enablement
Per Asset/ Monthly/Annual Subscriptions
- Ideal solution for SMB. Highly scalable to Enterprise and Telco Retail segments.
Capabilities:
- Autnhive
- Tenable ASM
- Cloud Risk Management
- Attack Surface Management
- Comprehensive Reports.
- CTEM – Simplified Continuous Threat Exposure Management
- Next-Gen Data Security Protection Platform
- Products can be purchased separately or Bundled options available for respective vendors.
On-Prem/Cloud Firewall SD-WAN enablements
Quote will be based on vendor hardware platform
- Ideal solution for SMB. Highly scalable to Enterprise and Telco Retail segments.
Capabilities:
- Palo Alto
- Fortinet
- Cisco
- Juniper
- Check Point
- Next-Gen/AI based physical and virtual firewalling from popular vendors.
- Policy Configurations
- Integration to external automation systems.
- Capability check and integration to SASE
- Comprehensive Reports.
- Products can be purchased separately or Bundled options available for respective vendors.
-
Features Include:
Vulnerability and Pen Testing
Per Asset/ Monthly/Annual Subscriptions
- Ideal solution for SMB. Highly scalable to Enterprise and Telco Retail segments.
Capabilities:
- Tenable
- Nessus Professional tool
- Continuous Discovery and Assessment
- Automated Vulnerability Prioritization
- Real-time Visualization
- Asset Tracking
- Passive Network Monitoring
- Compliance Management
- Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System (CVSS) v4 Support
- Web Application Scanning
- Tenable VM can be purchased as a Standalone or component of Tenable One
MFA Enablement Services
Quote will be based on requirements
- OKTA Integration
- Cisco Duo Integration
- Google workspace Integration
- Azure Entra ID Integration
- Assess MFA requirements
Architecture, Design and Deployment
Quote will be based on requirements
- Requirement analysis
- development of Solution Architecture
- Develop Detailed designs for Network and Security components including but not limited to traffic flows
- configurations
- management
- redundancy
- migration and cutover scenarios.
- Assess capability of vendor API and Automation driven approach to deployments
- integrations with Customer portals.
- Develop detailed designs for Remote Monitoring scenarios.
Network/Security Automation enablement
Quote will be based on requirements
- Capabilities:
- Ansible Automation Platform
- Terraform
- GO. JAVA. HLL
- Open and Extensible Platform for Automated Playbook Creation and Orchestration
- Low-code automation playbooks to scale up & speeds up deployment
- API based approach and future AI driven Security Automation.
- Prebuilt integrations and Automation Content packs.
- Capability to support Multi-Vendor SASE/SD-WAN
- Network and Security upgrades on Juniper
- Palo Cisco etc.
Security Proof of Concept Services
Quote will be based on requirements
- Comprehensive Vendor Evaluation. Functional analysis for selection of SASE. Cloud Security. SD-WAN
- MDR and XDR platforms of popular vendors.
All vendors will be thoroughly evaluated and ratings provided. Equipped with API automated development frameworks. Coverage across the following vendor platforms:- Check Point Infinity
- Palo Alto Prisma
- Fortinet FortiSASE
- Netskope SSE
- Cloud Flare ZTNA
Security Assessment Services
FREE
- Assess customer network/security environment
- Gather Network/Security requirements.
- Propose ideal vendor security solution for Risk Management and Compliance; SASE; Workspace; Cloud Security; Unified Detection and Response solutions.
- Assess API driven approach to automate deployments to applicable customer environment scenarios
Training Services
Quote will be based on requirements
- Class-Room training: In-person sessions led by Cybersecurity experts on cyber awareness; foundational and emerging cyber technologies.
- Web-based Training: Online courses that offer flexibility and scalability.
- Vendor-specific Training: Focuses on specific products or platforms like Check Point; CloudFlare or Tenable.
- Compliance Training: Covers industry regulations and compliance standards
- Simulated Phishing and Social Engineering Attacks: Realistic simulations to test and enhance employee responses to threats.
- Advanced Technical Training: Provides in-depth technical training for IT; Network and Security teams.
NOTE
All services carry either one-time contract or per hour estimates, plus the estimate of one-time monthly/annual software cost for Cloud products and Hardware costs for On-Prem products.
Where applicable, all solutions include Cloud Security coverage applicable to some of the following
On-Prem Infrastructure / user devices:
- User laptops
- Mobile phones
- Printers
- Card readers
- Security systems
- CCTV
- Other control systems
- such as lifts/fire
- Routers/Switches
- MFA, IAM/PAM