A COMPARISON WITH OTHER APPROACHES

THE MARKET FOR INFORMATION SECURITY SERVICES INCLUDES:

PENTESTERS

Good hackers that hack the infrastructure like highly trained intruders.

A one-time service costs $5,000-$15,000.

INFORMATION SECURITY VENDORS

Systems integrators from major vendors. Their job is to sell the solution but not to operate it, with the assumption that you will have qualified in-house support.

They are interested in working with companies of 100 or more people.

SECURITY OPERATION CENTER (SOC)

Analysts look for advanced attacks in the logs they are provided with. A high-quality but expensive service.

AUDITORS

They prepare you for ISO 27001, PCI DSS, and other certifications. The price range starts from $3,000.

SERVICE

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

SERVICE

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

SERVICE

OSINT Intelligence (one-time)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

OSINT Intelligence (one-time)

Infrastructure scanning for vulnerabilities (one-time)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Infrastructure scanning for vulnerabilities (one-time)

Infrastructure scanning for vulnerabilities (regular)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Infrastructure scanning for vulnerabilities (regular)

Automated scanning of web applications for vulnerabilities (one-time)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Automated scanning of web applications for vulnerabilities (one-time)

Automated scanning of web applications for vulnerabilities (regular)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Automated scanning of web applications for vulnerabilities (regular)

Phishing (one-time)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

As agreed

Phishing (one-time)

As agreed

Phishing (regular)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

As agreed

Phishing (regular)

As agreed

Password brute force attacks

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

As agreed

Password brute force attacks

As agreed

Auditing your software code

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

As agreed

Auditing your software code

As agreed

Selling protection equipment (CAPEX)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Selling protection equipment (CAPEX)
Renting protection equipment (OPEX)

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Renting protection equipment (OPEX)
Operating protection equipment

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Operating protection equipment
Hacker trap rental

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Hacker trap rental
Trap monitoring

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Trap monitoring
Server security monitoring

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Server security monitoring
Employee security awareness

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Employee security awareness
Log collection and storage

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Log collection and storage
Searching for signs of hacking

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Searching for signs of hacking
Preparation for certification

PENTESTERS

VENDORS

SOC

AUDITORS

DIS.WORKS

Preparation for certification

OUR ADVANTAGES OVER OTHERS

We have professional pentester and top scanning systems that ensure no known vulnerabilities in the external and internal perimeters. Unlike pentesters, we don’t just do a one-time scan; we do it regularly.

For every security problem, vendors have several Enterprise products, usually with a starting price tag of $10,000. It takes a long time to decide on decent solutions. Since we don’t make money on sales, we pick the most effective solution, and if we don’t find one, we develop it ourselves (The Brick).

SOC is too expensive for SMEs, but we collect logs to detect and investigate incidents, and if necessary, we can quickly connect any external SOC.

We approach frameworks and standards such as ISO 27001 and Cyber Essential from a practical perspective. The wisdom contained in them is more important to us than blind compliance. We implement the essentials first and gradually add the rest.