CYBERSECURITY PROVIDERS

Outsource your cybersecurity department

We provide you with an expert cybersecurity team to prevent cyberattacks in your company.
 

ESED, your IT team specialized in cybersecurity, close and tailored to your needs

WHY SHOULD YOU HAVE THE SUPPORT OF EXTERNAL IT SECURITY PROFESSIONALS?

Managed cybersecurity

Work in a secure environment with MDR solutions: we handle incident management, vulnerability analysis, threat detection, ransomware protection, regulatory compliance, and 24/7 monitoring.

Active threat hunting

We conduct "Threat Hunting" actions. We are constantly searching for threats proactively to detect suspicious behaviors that may have gone unnoticed.

Constant monitoring

We automatically monitor and periodically update your systems to ensure their security. Most cyberattacks and security breaches occur due to outdated systems.

Security validations: Pentesting

We periodically validate the security of your company and system through "pentesting" or penetration techniques. This way, we can design cybersecurity strategies tailored to the vulnerabilities and critical points of your business.

We take care of...

"We went from 25% of the company experiencing 10 attacks a day to having none."
Logo-excelium-testimonio-home
SERGIO GÓMEZ

Consultor & CIO de Excelium

implementación-google-workspace-y-office
Calculate the cost of a cyberattack
Calculator to determine the financial impact of a ransomware cyberattack on a company.
Calculate

Our rates

We work with fixed rates.

 

Basic

349€/month

 

Medium

499€/month

 

Plus

749€/month

 

Premium

999€/month

 

SERVICES
Basic
Medium
Plus
Premium
Cybersecurity Consulting
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Auditoría inicial de ciberseguridad
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Management and administration of cybersecurity platform
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Cybersecurity strategy for enhancing company security
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Master security plan
comptab-no-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
Assigned Technician
comptab-no-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
Main functions
Basic
Medium
Plus
Premium
Endpoint system with integrated XDR (Advanced antivirus)
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
24/7 Threat Monitoring and Response (MDR)
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Comprehensive incident response: Threats are completely eliminated (MDR)
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Threat containment: attacks are interrupted and their spread is prevented (MDR).
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Root cause analysis (MDR)
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Constant threat hunting
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Weekly and monthly reports
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Breach Protection Warranty: Covers up to $1 million in response expenses
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
ADDITONAL SOLUTIONS
Basic
Medium
Plus
Premium
Phishing Protection (Anti-Phishing System)
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Device Encryption
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
comptab-yes-icon
Phishing Simulations: Number of simulation campaigns for year
comptab-no-icon
comptab-no-icon
2
4
Cybersecurity Training for company employees
comptab-no-icon
comptab-no-icon
comptab-yes-icon
comptab-yes-icon
Advanced mobile device protection and management (MDM)
comptab-no-icon
comptab-no-icon
comptab-no-icon
comptab-yes-icon
MONTHLY VARIABLE COSTS
Basic
Medium
Plus
Premium
Cost per user
21,25€/month
23,25€/month
26,50€/month
32,50€/month
Cost per server
42,50€/month
42,50€/month
42,50€/month
42,50€/month
Cost per mailbox
3,35€/month
3,35€/month
3,35€/month
3,35€/month

Do you need more information or have any questions?

Please fill out the following form, and an IT cybersecurity specialist will contact you.