Straightforward product licensing & bundles

We believe in simple and straightforward licensing and bundles, making it easy for your organization to get started. 

FEATURES

All included with each product

All features and functions are included when you buy one of our products. Simple! 

Pricing_features_illustration

LICENSING

Licensing based on the number of assets

Each product is licensed based on the number of assessed technical or human assets. 

System & Network Security_v2

System & Network Security

Licensing is based on active IPs, meaning systems and computers placed in a TCP/IP network. A system can be a physical server and/or virtual machine.  

Product details
Web Application Security_v2

Web Application Security

Licensing is based on the number of assessed unique web applications (or URLs). Each application scanned requires one unique license. 

Product details
Cloud Security_v2

Cloud Security (CSPM)

Licensing is based on the number of cloud resources assessed. A cloud resource is an object resource within a cloud service, such as an S3 bucket in AWS. 

Product details
API Security_v2

API Security

Licensed based on the number of unique API applications assessed, like REST APIs, GraphQL, and SOAP APIs.

Product details
Phishing Simulation & Awareness Training_v2

Phishing Simulation & Awareness Training

Licensed based on the number of users (email addresses) targeted by the phishing simulations and awareness training programs. This is usually the same as the number of employees. 

Product details

How can we help you?

UNIFICATION

Integrated products in a unified platform

Unlike our competitors, all products in our platform are fully integrated to streamline workflows based on a risk model. 
Platform_blueprint@2x
PACKAGES

Packages for NIS2, municipalities & SMBs

NI2 package

NIS2, the second and more stringent version of the EU directive NIS, will enter into effect throughout 2025. There are hundreds of thousands of organizations within the EU member states that must comply as well as those indirectly affected as suppliers. 

Read more about NIS2

Municipality package

Municipalities are a growing target for cyberattacks that aim to create disruption and uncertainty in society. We are the most important partner to help you establish a systematic and risk-based approach to cyber security. 

Request a quote

SMB packages

We have made it simple for small- and medium-sized businesses to take a major leap toward a proactive cyber defense with one of our small business packages.  

Request a quote
REQUEST A QUOTE

One step closer to a proactive cyber defense

  • Create a risk-based, systematic & proactive cyber defense


    Our platform is the perfect foundation for a systematic, risk-based, and proactive cyber defense aligned with compliance such as NIS and NIS2.  

  • Keep up to date with your attack surface & find vulnerabilities in all attack vectors


    Attack Surface Management (ASM) and automated and continuous vulnerability management - all in one place.

  • Detect weak users & arm them against phishing & ransomware


    Build your human firewall against all types of social engineering, such as phishing, spear phishing, and ransomware attacks. Create simulated phishing attacks followed by automated awareness training.
FREQUENTLY ASKED QUESTIONS

FAQ

What does the contract setup look like?

Contracts are based on products and the number of licenses for each product. The contract length is usually from 1-3 years, as vulnerability management is a long-term effort. 

Which products do you offer?

We offer the following products. You choose which products to go with. 

  • System & Network Security 
    Identifying over 150,000 vulnerabilities in business-critical systems/servers, computers, network devices, office equipment, IoT, OT (Operational Technology), and cloud platforms. 

    Product details

 

  • Web Application Security 

    Advanced assessment technologies to identify thousands of vulnerabilities, including OWASP Top 10, in modern web applications. 

    Product details

 

  • Cloud Security (CSPM) 

    Secure your cloud-native platforms by identifying thousands of vulnerabilities in Microsoft Azure, AWS, Google Cloud, and Oracle Cloud.  

    Product details

 

  • API Security 

    Assess your APIs for hundreds of vulnerabilities, including the OWASP API Top 10, to ensure their security and protect critical data.  

    Product details

 

  • Phishing Simulation & Awareness Training  

    Run simulated phishing attacks with tailored awareness training for continuous awareness and to build your human firewall. 

    Product details

How are the products licensed?

Each product is licensed based on the number of assets. 

  • System & Network Security:

    Active IPs 

  • Web Application Security:

    Web apps (URL) 

  • API Security:

    API applications 

  • Phishing Simulation & Awareness Training:

    Users (email addresses) 

 

Can I buy any number of products?

Yes, you can buy one or multiple products in a bundle.  

Do you sell bundles or packages?

Yes, we have ready-made packages and offer product bundles.  

Are the products integrated?

Yes, all products are fully integrated to streamline workflows based on one risk model. 

How much does it cost?

It depends on the following: 

  • Products 
  • Licenses for each product 
  • Contract length 

Request a quote or contact us.

 

What are the contract lengths?

As vulnerability management is a long-term effort, contracts are usually signed between 1-3 years. 

Do you offer any discounts?

Depending on product bundles (packages) and contract lengths, discounts can be discussed. Request a quote to find out more. 

Do you offer on-premise deployment?

Yes, we provide cloud and on-premise deployment. 

Do you offer cloud deployment?

Yes, we provide cloud and on-premise deployment. 

Your trusted partner

To show our commitment to information security, cyber security, and data privacy, we are ISO 27001:2022 and NIS/NIS2 certified.
 
NIS2_ISO_badges_NIS_ISO_badges