Small Business Essentials
This package is designed to be a quick and easy security assessment that quickly gauges your organisation’s security posture for low hanging fruit and obvious vulnerabilities from internet-based attackers.
Email leak search in public and private leak databases.
Credential leak search in public and private leak databases.
Domain name search for compromise / breaches.
The outcome is a detailed report showing if your organisation has been compromised, or at what level of risk the organisation is currently facing due to credential leaks, including susceptibility to password stuffing attacks via the organisation’s internet-facing authenticated services.
Commercial-grade vulnerability scanning against external network / internet perimeter (up to 30 IP addresses).
Assessment covers web applications, network devices, remote access solutions, firewalls and any networked service published to the internet.
The outcome is a detailed report show what services each host has published to the internet, what services are vulnerable to attack and expert advice on how to mitigate the risks that were uncovered during the assessment.
Commercial-grade vulnerability scanning of web applications (up to 10), as an unauthenticated user, checking for all common web vulnerabilities (based on OWASP Top 10),
The outcome is a detailed section in the report that details the methodology and checks performed, issues identified and exert advice on how to remediate each discovered vulnerability.
$2000 AUD exGST
External Network: No more than 30 active IP addresses.
Web Application: Unauthenticated testing only (not testing user logins). Up to 10 websites.