Packages
At Digital Track, we offer flexible pricing plans tailored to meet the unique needs of your organization. Our transparent pricing ensures you know exactly what you’re getting, with no hidden fees.
DT ARMOUR
• ISO 27001 Compliance Assessment
• O365 / eMail Security Assessment
• Data Protection Assessment (GDPR)
• vCISO as a service
• Information Security Policies review
and creation
• Review of Risk Management Program
• Cyber Security User Awareness
• Phishing Attack Simulation
• External Vulnerability Assessment
• External Penetration Testing
• Red Teaming activity (one time)
• Security configuration assessment
(one time)
• SOC monitoring and Incident Response
• Continuous attack surface discovery
• Breach Attack Simulation
• Deep Dark web Search
DT DEFENDER
DT ARMOUR
+
Cloud Security Assessment
DT ARMOUR
+
Cloud Infrastructure Review
• Half Yearly Red Teaming
• Internal Quarterly Vulnerability Assessment
• Internal Yearly Penetration Testing
• Web and Mobile application Penetration
Testing
• Wireless Penetration Testing (half yearly)
• API Testing and Source Code Review
• Cloud Security Posture Management
• Database Security Posture Management
DT PROTECTOR
DT DEFENDER
+
Security Maturity Assessment
DT DEFENDER
+
• Cyber Security User Awareness (premium)
• Yearly health checks on implemented
security solutions
DT DEFENDER
+
• Vulnerability Management
• Risk Management
• Compliance Management
• Vendor Management
• Incident Management
• Cyber Threat Intelligence
IS GRC SERVICE PACKAGE
- Review the existing security policies, procedures, and plans. Make necessary changes to the documents towards its improvement.
- Prepare the quarterly governance tracking checklist. Conduct quarterly checks to identify compliance and non-compliance.
- Track closure of the risks identified.
- Track vulnerabilities towards closure.
- Collect evidence of compliance towards regulatory circulars.
- Respond to regulatory circulars.
- Oversee the completion of Security Awareness Training by the employees and track toward closure.
- Track through governance meetings.
- Conduct quarterly governance meetings with the stakeholders.
- During the incident, be the incident commander and initiate the incident response. Determine whether it is a Data Breach or a security incident. Determine the severity and invoke the incident response.
- Review of Architecture and IT Governance.
- DR Drill and tabletop exercises (once a year).