Straightforward product licensing & bundles
We believe in simple and straightforward licensing and bundles, making it easy for your organization to get started.
Licensing based on the number of assets
Each product is licensed based on the number of assessed technical or human assets.
System & Network Security
Licensing is based on active IPs, meaning systems and computers placed in a TCP/IP network. A system can be a physical server and/or virtual machine.
Web Application Security
Licensing is based on the number of assessed unique web applications (or URLs). Each application scanned requires one unique license.
Cloud Security (CSPM)
Licensing is based on the number of cloud resources assessed. A cloud resource is an object resource within a cloud service, such as an S3 bucket in AWS.
API Security
Licensed based on the number of unique API applications assessed, like REST APIs, GraphQL, and SOAP APIs.
Phishing Simulation & Awareness Training
Licensed based on the number of users (email addresses) targeted by the phishing simulations and awareness training programs. This is usually the same as the number of employees.
How can we help you?
Packages for NIS2, municipalities & SMBs
NI2 package
NIS2, the second and more stringent version of the EU directive NIS, will enter into effect throughout 2025. There are hundreds of thousands of organizations within the EU member states that must comply as well as those indirectly affected as suppliers.
Municipality package
Municipalities are a growing target for cyberattacks that aim to create disruption and uncertainty in society. We are the most important partner to help you establish a systematic and risk-based approach to cyber security.
SMB packages
We have made it simple for small- and medium-sized businesses to take a major leap toward a proactive cyber defense with one of our small business packages.
One step closer to a proactive cyber defense
-
Create a risk-based, systematic & proactive cyber defense
Our platform is the perfect foundation for a systematic, risk-based, and proactive cyber defense aligned with compliance such as NIS and NIS2. -
Keep up to date with your attack surface & find vulnerabilities in all attack vectors
Attack Surface Management (ASM) and automated and continuous vulnerability management - all in one place. -
Detect weak users & arm them against phishing & ransomware
Build your human firewall against all types of social engineering, such as phishing, spear phishing, and ransomware attacks. Create simulated phishing attacks followed by automated awareness training.
FAQ
What does the contract setup look like?
Contracts are based on products and the number of licenses for each product. The contract length is usually from 1-3 years, as vulnerability management is a long-term effort.
Which products do you offer?
We offer the following products. You choose which products to go with.
-
System & Network Security
Identifying over 150,000 vulnerabilities in business-critical systems/servers, computers, network devices, office equipment, IoT, OT (Operational Technology), and cloud platforms.
Product details
-
Web Application Security
Advanced assessment technologies to identify thousands of vulnerabilities, including OWASP Top 10, in modern web applications.
Product details
-
Cloud Security (CSPM)
Secure your cloud-native platforms by identifying thousands of vulnerabilities in Microsoft Azure, AWS, Google Cloud, and Oracle Cloud.
Product details
-
API Security
Assess your APIs for hundreds of vulnerabilities, including the OWASP API Top 10, to ensure their security and protect critical data.
Product details
-
Phishing Simulation & Awareness Training
Run simulated phishing attacks with tailored awareness training for continuous awareness and to build your human firewall.
Product details
How are the products licensed?
Each product is licensed based on the number of assets.
-
System & Network Security:
Active IPs
-
Web Application Security:
Web apps (URL)
-
Cloud Security:
Cloud resources (see what counts as a cloud resource)
-
API Security:
API applications
-
Phishing Simulation & Awareness Training:
Users (email addresses)
Can I buy any number of products?
Yes, you can buy one or multiple products in a bundle.
Do you sell bundles or packages?
Yes, we have ready-made packages and offer product bundles.
Are the products integrated?
Yes, all products are fully integrated to streamline workflows based on one risk model.
How much does it cost?
It depends on the following:
- Products
- Licenses for each product
- Contract length
Request a quote or contact us.
What are the contract lengths?
As vulnerability management is a long-term effort, contracts are usually signed between 1-3 years.
Do you offer any discounts?
Depending on product bundles (packages) and contract lengths, discounts can be discussed. Request a quote to find out more.
Do you offer on-premise deployment?
Yes, we provide cloud and on-premise deployment.
Do you offer cloud deployment?
Yes, we provide cloud and on-premise deployment.