We act as your in-house cybersecurity team. Continuous monitoring, threat detection, compliance support, and clear monthly reporting โ so you can focus on running your business.
Looking to automate your business operations securely? See our AI Workflow Automation service โ built by the same security engineering team.
All plans include a free onboarding security assessment. Scale up or down as your business grows.
Your business is unique. Your security package should be too. Tell us your environment, your risks, and your budget โ we'll build the right plan.
Discuss a Custom Plan* Starting price. Includes 3/5/8 endpoints and users respectively. Additional endpoints and users billed at tier rates above. vCISO available ad-hoc on Detect at CHF 280/hr. All plans include initial security posture assessment. Prices exclude VAT.
One-off projects (pen tests, audits, assessments)? See Project Services.
Select a plan, then enter your number of devices and users.
1 โ Select a plan
2 โ Enter your numbers
Estimates based on endpoint + user count only. Final pricing confirmed during your free assessment.
Built into every plan, regardless of tier.
Sign a 12-month contract and we run a full posture review and architecture assessment โ at no cost. You see exactly where you stand before we start.
Quarterly threat trend reports and an annual deep-brief on what's actually targeting businesses like yours. Knowledge transfer, not just service delivery.
Every tier comes with response time commitments and coverage hours matched to its scope. Detailed SLA framework provided with every service contract.
Refer another business that signs with us โ earn 10% off your plan, for as long as they stay with us.
All prices in CHF + VAT.
| Feature | Detect | Defend | Disarm | Custom |
|---|---|---|---|---|
| Monthly base price | CHF 990 | CHF 1,990 | CHF 3,990 | Custom |
| Included endpoints | 3 | 5 | 8 | Custom |
| Included users | 3 | 5 | 8 | Custom |
| Per extra endpoint | CHF 60 | CHF 95 | CHF 130 | Custom |
| Per extra user | CHF 60 | CHF 95 | CHF 130 | Custom |
| Endpoint Protection | ||||
| Antivirus / endpoint protection | Basic AV | Managed EDR | Managed EDR | Custom |
| Patch management | โ | โ | โ | Custom |
| Endpoint hardening baseline | โ | โ | โ | Custom |
| Vulnerability scanning | โ | Monthly + remediation | Monthly + remediation | Custom |
| Threat hunting (proactive) | โ | โ | โ | Custom |
| Email Security | ||||
| Anti-phishing + DMARC monitoring | โ | โ | โ | Custom |
| DMARC enforcement + sandbox + exec impersonation | โ | โ | โ | Custom |
| Identity & Network | ||||
| IAM (M365/Entra ID, MFA, Conditional Access) | โ | โ | โ | Custom |
| DNS filtering + secure web gateway | โ | โ | โ | Custom |
| Firewall management | โ | 1 included | 1 included | Custom |
| Data Protection | ||||
| Data Security & Loss Prevention Strategy | โ | โ | โ | Custom |
| Visibility & SIEM | ||||
| SIEM (Wazuh) | โ | 30-day retention | 90-day + custom rules | Custom |
| SIEM analyst review | โ | 8ร5 | 24/7 human SOC | Custom |
| Cloud security posture mgmt | โ | โ | โ | Custom |
| Executive reporting | Quarterly | Monthly | Monthly | Custom |
| Threat intel briefings | โ | โ | โ | โ |
| Governance & Compliance | ||||
| Employee security policy | โ | โ | โ | Custom |
| Audit-ready evidence packs | โ | โ | โ | Custom |
| Third-party / vendor risk management | โ | โ | โ | Custom |
| People | ||||
| Awareness training | Monthly + annual brief | Monthly + annual brief | Monthly + annual brief | Custom |
| Phishing simulation | Yearly, targeted | 2ร/year, targeted | Quarterly, targeted | Custom |
| Response & Advisory | ||||
| vCISO hours included | Ad-hoc (CHF 280/hr) | 2 hrs/month | 4 hrs/month | Custom |
| Named engineer as primary contact | โ | โ | โ | Custom |
| Forensics retainer | โ | โ | โ | Custom |
| Annual tabletop exercise | โ | โ | โ | Custom |
| Dedicated phone line + escalation chain | โ | โ | โ | Custom |
Not sure which tier fits your environment?
No worries. Most of our clients were not sure. We assist in building the perfect package for your business.
Book a free consultationEvery engagement starts with a thorough review of your current security posture โ endpoints, email, identity, network perimeter, and policies. You get a clear picture of your risk from day one.
We deploy and manage monitoring tooling across your environment. Threats are detected before they escalate. You receive alerts for critical events, not noise.
Monthly or weekly reports in plain language. What was detected. What was blocked. What changed in your risk landscape. What we recommend next. No jargon.
Your employees are your biggest vulnerability and your strongest potential asset. We train them to recognize and stop threats before they become incidents.
If something goes wrong, you have a direct line to professionals who know your environment. Rapid triage, containment, and recovery โ not a generic helpdesk.
GDPR, NIS2, ISO 27001 guidance baked into your security posture. We help you meet requirements without turning compliance into a full-time job.
Book a free 30-minute consultation. We'll review your current exposure and recommend the right starting point โ no commitment required.