CYBERSECURITY AND IT SERVICE PROVIDERS

Outsource your cybersecurity and IT solutions department

 

Unlike other models, we work with a fixed monthly fee that includes proactive services to keep your systems and digital platforms secure and fully operational.
 
It also includes an optional module for outsourcing IT services.
 
estudio ESED Mataró_20-1
Choose the plan that best fits your company’s needs.
Choose cybersecurity services only, or cybersecurity + IT services

Easy and fast onboarding: We conduct an initial kick-off to start the process. After the first meeting, we take care of everything, saving the client time and effort.

The price of our plans includes the software licensing for the cybersecurity solutions.

CYBERSECURITY SERVICES
Basic
Medium
Plus
Premium
Cybersecurity consulting comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Initial cybersecurity assessment comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Security Roadmap Development comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Security solutions tnterconnection (Aggregated Security) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
24/7 Security Monitoring comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Management and administration of Endpoint Security (antivirus) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
XDR management and administration (Threat Traceability) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Anti-Phishing solution management and administration comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Elaboración del documento de seguridad comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Data encryption management and administration comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Phishing Simulation Management and Administration comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
MDM Management and Administration (Mobile Device Management) comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
KEY FEATURES
Basic
Medium
Plus
Premium
Advanced AI detection engines comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Endpoint Licenses with XDR and MDR Included (Advanced Antivirus with Traceability) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
24/7 Threat containment and response comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Threat Containment: Attack interruption and prevention comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Comprehensive incident response: Complete threat removal comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Advanced Protection Against Modern Ransomware comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Weekly and monthly reports comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Búsqueda de amenazas constante (Threat Hunting Activo) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Root Cause Analysis of the Threat comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Integration of 24/7 protection with third-party systems comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Security Data Lake comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Security Telemetry Data Retention (up to 90 days) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Average response times in Detection/Response/Resolution: 2' / 20' / 60' comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Breach Protection Warranty (Coverage up to 1M USD)* comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon


*Subject to specific terms and conditions of the external warranty service provider.

ADDITIONAL PROTECTION
Basic
Medium
Plus
Premium
Phishing Protection (Anti-Phishing System) comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Data encryption comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Simulaciones de Phishing comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
Mobile device fleet management comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
Cloud infrastructure protection comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
OPTIONAL IT SERVICES MODULE
Basic
Medium
Plus
Premium
User Technical Support (ServiceDesk) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Incident Management Platform comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Cloud Platform Management (M365 or Google Workspace) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
24/7 Advanced monitoring and preventive device support comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Daily Backup Management and Monitoring (Double Verification) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Employee onboarding and offboarding protocols comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Employee technology onboarding comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Technology consulting and strategy comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
IT equipment inventory and lifecycle management comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
License and software management comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
IT equipment procurement and management comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Corporate network and WiFi management comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Configuration and management of VPNs comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
IT user satisfaction surveys and monitoring comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Critical update deployment and monitoring comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Testing and validation before mass changes comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Account and access management (SSO, MFA, etc.) comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Permission and access policy review and optimization comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
License, Software, and Hardware Expense Audit comptab-infoalt7-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Support for adoption of new technologies comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
PC and server performance analysis comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Hardware/Software optimization recommendations comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Warranty management with manufacturers comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Server administration and management comptab-infoalt7-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Identification of friction points and improvement in technological processes comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
Firewall administration and management comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
Cost optimization recommendations for Cloud or On-Premise Infrastructure comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
IT assistancebots or automated responses in ServiceDesk comptab-infoalt7-icon
comptab-no-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
Maximum response time comptab-infoalt7-icon
12h
8h
6h
4h
Calculate your plan
At the following link, you can check our pricing plans and run a simulation to estimate the cost for your company

ESED, your trusted cybersecurity specialists close, reliable, and tailored to your needs

Why should you rely on external cybersecurity professionals?

Managed cybersecurity

Operate in a secure environment with MDR solutions: we handle incident management, vulnerability analysis, threat detection, ransomware protection, regulatory compliance, and 24/7 monitoring.

Proactive Threat Hunting

We actively perform threat hunting continuously searching for threats in a proactive manner to detect suspicious behaviors that may have gone unnoticed.

Constant monitoring

We continuously monitor and automatically update your systems to ensure their security. Most cyberattacks and security breaches occur due to outdated systems.

We take care of...

“Pasamos de que el 25% de la compañía tuviera 10 ataques al día, a no tener ninguno”.
Logo-excelium-testimonio-home
SERGIO GÓMEZ

Consultor & CIO de Excelium

¿Necesitas más información o te han quedado dudas?

Rellena el siguiente formulario y un especialista IT en ciberseguridad se pondrá en contacto contigo.