icon image

1300 351 255

Online 24/7

icon image

[email protected]

Contact Us

Other Services Pricing

iSecureX

Other Services Pricing Plans

MFA Enablement Services

Quote will be based on requirements

    • OKTA Integration
    • Cisco Duo Integration
    • Google workspace Integration
    • Azure Entra ID Integration
    • Assess MFA requirements

Architecture, Design and Deployment

Quote will be based on requirements

    • Requirement analysis
    • development of Solution Architecture
    • Develop Detailed designs for Network and Security components including but not limited to traffic flows
    • configurations
    • management
    • redundancy
    • migration and cutover scenarios.
    • Assess capability of vendor API and Automation driven approach to deployments
    • integrations with Customer portals.
    • Email
    • Develop detailed designs for Remote Monitoring scenarios.

Security Proof of Concept Services

Quote will be based on requirements

  • Comprehensive Vendor Evaluation. Functional analysis for selection of SASE. Cloud Security. SD-WAN
  • MDR and XDR platforms of popular vendors.
    All vendors will be thoroughly evaluated and ratings provided. Equipped with API automated development frameworks. Coverage across the following vendor platforms:
    • Check Point Infinity
    • Palo Alto Prisma
    • Fortinet FortiSASE
    • Netskope SSE
    • Cloud Flare ZTNA
    Evaluate and recommend major AI/ML frameworks and architectures for Cyber security. Azure and AWS Security Components evaluation

Security Assessment Services

FREE

    • Assess customer network/security environment
    • Gather Network/Security requirements.
    • Propose ideal vendor security solution for Risk Management and Compliance; SASE; Workspace; Cloud Security; Unified Detection and Response solutions.
    • Assess API driven approach to automate deployments to applicable customer environment scenarios

Training Services

Quote will be based on requirements

    • Class-Room training:  In-person sessions led by Cybersecurity experts on cyber awareness; foundational and emerging cyber technologies.
    • Web-based Training: Online courses that offer flexibility and scalability.
    • Vendor-specific Training: Focuses on specific products or platforms like Check Point; CloudFlare or Tenable.
    • Compliance Training: Covers industry regulations and compliance standards
    • Simulated Phishing and Social Engineering Attacks: Realistic simulations to test and enhance employee responses to threats.
    • Advanced Technical Training: Provides in-depth technical training for IT; Network and Security teams.
image

NOTE

All services carry either one-time contract or per hour estimates, plus the estimate of one-time monthly/annual software cost for Cloud products and Hardware costs for On-Prem products.
Where applicable, all solutions include Cloud Security coverage applicable to some of the following On-Prem Infrastructure / user devices:

  • User laptops
  • Mobile phones
  • Printers
  • Card readers
  • Security systems
  • CCTV
  • Other control systems
  • such as lifts/fire
  • Routers/Switches
  • MFA, IAM/PAM