Pricing Tables

$
Hottest offer

Security Requirements & Threat Modeling

  • Security Requirement - On the product designing table, a list of security requirements is provided (secure by design)
  • Threat Modeling - Identify and prioritize potential threats based on application components (architecture).  
  •   Free Client Support
  • Findings pack with the corresponding remediations suggested.
$
Hottest offer

SAST and DAST Analysis

  • Manual SAST - Using code review tools, a report is provided to the product team with code security findings.
  • Manual DAST - Manual Penetration Testing covering common programming mistakes (OWASP).  
  • Automatic SAST & DAST  
  • Vulnerabilities report.
$
Hottest offer

DEVSECOPS

  • Include implementation of DEVSECOPS concept into the SDLC (Software Development Life Cycle). Concept as Automation, Continuous Integration, Security as Code, Thread Modeling and Change Management are part of our services.
  •   Change Management Plan to transition from a traditional development process to an effective model to produce code.
  •    
  •  
$
Hottest offer

Education on Security Aspects

  • Effective training to know how to build security into software and services to make product security a priority.
  •   Training program for intended audience to gradually become proficient on security topics.
  •    
  •