Other Services Pricing
iSecureX
Other Services Pricing Plans
MFA Enablement Services
Quote will be based on requirements
- OKTA Integration
- Cisco Duo Integration
- Google workspace Integration
- Azure Entra ID Integration
- Assess MFA requirements
Architecture, Design and Deployment
Quote will be based on requirements
- Requirement analysis
- development of Solution Architecture
- Develop Detailed designs for Network and Security components including but not limited to traffic flows
- configurations
- management
- redundancy
- migration and cutover scenarios.
- Assess capability of vendor API and Automation driven approach to deployments
- integrations with Customer portals.
- Develop detailed designs for Remote Monitoring scenarios.
Security Proof of Concept Services
Quote will be based on requirements
- Comprehensive Vendor Evaluation. Functional analysis for selection of SASE. Cloud Security. SD-WAN
- MDR and XDR platforms of popular vendors.
All vendors will be thoroughly evaluated and ratings provided. Equipped with API automated development frameworks. Coverage across the following vendor platforms:- Check Point Infinity
- Palo Alto Prisma
- Fortinet FortiSASE
- Netskope SSE
- Cloud Flare ZTNA
Security Assessment Services
FREE
- Assess customer network/security environment
- Gather Network/Security requirements.
- Propose ideal vendor security solution for Risk Management and Compliance; SASE; Workspace; Cloud Security; Unified Detection and Response solutions.
- Assess API driven approach to automate deployments to applicable customer environment scenarios
Training Services
Quote will be based on requirements
- Class-Room training: In-person sessions led by Cybersecurity experts on cyber awareness; foundational and emerging cyber technologies.
- Web-based Training: Online courses that offer flexibility and scalability.
- Vendor-specific Training: Focuses on specific products or platforms like Check Point; CloudFlare or Tenable.
- Compliance Training: Covers industry regulations and compliance standards
- Simulated Phishing and Social Engineering Attacks: Realistic simulations to test and enhance employee responses to threats.
- Advanced Technical Training: Provides in-depth technical training for IT; Network and Security teams.
NOTE
All services carry either one-time contract or per hour estimates, plus the estimate of one-time monthly/annual software cost for Cloud products and Hardware costs for On-Prem products.
Where applicable, all solutions include Cloud Security coverage applicable to some of the following
On-Prem Infrastructure / user devices:
- User laptops
- Mobile phones
- Printers
- Card readers
- Security systems
- CCTV
- Other control systems
- such as lifts/fire
- Routers/Switches
- MFA, IAM/PAM