Digital Track Saudi

Packages

At Digital Track, we offer flexible pricing plans tailored to meet the unique needs of your organization. Our transparent pricing ensures you know exactly what you’re getting, with no hidden fees.

DT ARMOUR

• ISO 27001 Compliance Assessment
• O365 / eMail Security Assessment
• Data Protection Assessment (GDPR)
• vCISO as a service

• Information Security Policies review
and creation
• Review of Risk Management Program
• Cyber Security User Awareness
• Phishing Attack Simulation

• External Vulnerability Assessment
• External Penetration Testing
• Red Teaming activity (one time)
• Security configuration assessment
(one time)
• SOC monitoring and Incident Response
• Continuous attack surface discovery
• Breach Attack Simulation
• Deep Dark web Search

DT DEFENDER

DT ARMOUR
+
Cloud Security Assessment

DT ARMOUR
+
Cloud Infrastructure Review

• Half Yearly Red Teaming
• Internal Quarterly Vulnerability Assessment
• Internal Yearly Penetration Testing
• Web and Mobile application Penetration
Testing
• Wireless Penetration Testing (half yearly)
• API Testing and Source Code Review
• Cloud Security Posture Management
• Database Security Posture Management

DT PROTECTOR

DT DEFENDER
+
Security Maturity Assessment

DT DEFENDER
+
• Cyber Security User Awareness (premium)
• Yearly health checks on implemented
security solutions

DT DEFENDER
+
• Vulnerability Management
• Risk Management
• Compliance Management
• Vendor Management
• Incident Management
• Cyber Threat Intelligence

IS GRC SERVICE PACKAGE
  • Review the existing security policies, procedures, and plans. Make necessary changes to the documents towards its improvement.
  • Prepare the quarterly governance tracking checklist. Conduct quarterly checks to identify compliance and non-compliance.
  • Track closure of the risks identified.
  • Track vulnerabilities towards closure.
  • Collect evidence of compliance towards regulatory circulars.
  • Respond to regulatory circulars.
  • Oversee the completion of Security Awareness Training by the employees and track toward closure.
  • Track through governance meetings.
  • Conduct quarterly governance meetings with the stakeholders.
  • During the incident, be the incident commander and initiate the incident response. Determine whether it is a Data Breach or a security incident. Determine the severity and invoke the incident response.
  • Review of Architecture and IT Governance.
  • DR Drill and tabletop exercises (once a year).
Scroll to Top