Sally for your Business

 

The best solution to have a 360º security surface.
We can scan your vulnerabilities
and help you mitigate them.

business
we can help you

Vulnerabilities Scan

 

We only need your domain. We
can check your security perimeter
and give you a report with all your
vulnerabilities.

 

There are two kind of reports:
Cyber Risk Basic Report
Cyber Risk Advanced Report

 

If you want, you can also ask Sally
to scan all your domains (in case
you have more than one). This is
an Attack Surface Check Report.

 

Here you also have:
Attack Surface Basic Report
Attack Surface Advanced Report

Functionalities

Basic Report
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

1850€

(per domain)

Advanced Report
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Brand Protection

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
   Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Price on request
Basic Report
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

1850€

(per domain)

Advanced Report
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Brand Protection

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
   Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Price on request

Vulnerabilities Monitoring

 

Maybe you not only want to know your vulnerabilities now.
Maybe you want to follow them up 24 hours, 7 days a week.
Then, this is your service.

 

Services
Cyber Risk Monitoring
Attack Surface monitoring
Basic or Advanced Monitoring
Real time alarms

 

Description
Yearly service
Quarterly or Monthly Reports
Analyst included if required

Functionalities

Basic Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Optional Functions

Quarterly or Monthly Reports

 

Price on request
Advanced Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential
– Social Media Intelligence

Brand Protection

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
   Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Quarterly or Monthly Reports

 

Price on request
Basic Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential

Optional Functions

Quarterly or Monthly Reports

 

Price on request
Advanced Monitoring
IT Perimeter Check

 

Safety Score

 

Reputation Score

 

Detailed Info

 

Risks Categories:

 

– Network
– Patch Management
– DNS Health
– Web Analysis
– Data Leak
– Email Security
– IP Reputation
– Leaked Credential
– Social Media Intelligence

Brand Protection

 

Risks Categories:

 

– Exposed Identities
– Brand Abuse
– Digital Exposure
– Malicious Domains
– Information Leaks
– Impersonation Social
   Media detections
– Social Unrest Activity
– Dark Web
– Insider Risk

Quarterly or Monthly Reports

 

Price on request

How Sally Works

Prevent
Breach
Vulnerability
Scanning
Digital & Physical
Assets

We complement the
Assume Breach strategy
with Digital Intelligence to
bring light to the blind
spots.

 

We find out threats and
vulnerabilities before they
reach the security
perimeter.

We scan the Surface,
Deep and Dark Web with
advanced tools, looking
for digital vulnerabilities.

 

We deliver a report with
actionable intelligence
insights to mitigate digital
risk exposure.

Reduce Risk Exposure and
Increase Digital Security &
Protection of Digital and
Physical Assets:

 

– VIP’s and employees
– servers
– databases
– technologies
– physical locations

Prevent
Breach

We complement the
Assume Breach strategy
with Digital Intelligence to
bring light to the blind
spots.

 

We find out threats and
vulnerabilities before they
reach the security
perimeter.

Vulnerability
Scanning

We scan the Surface,
Deep and Dark Web with
advanced tools, looking
for digital vulnerabilities.

 

We deliver a report with
actionable intelligence
insights to mitigate digital
risk exposure.

Digital & Physical
Assets

Reduce Risk Exposure and
Increase Digital Security &
Protection of Digital and
Physical Assets:

 

– VIP’s and employees
– servers
– databases
– technologies
– physical locations

Key Diferentiators

We use the Intelligence process based on a threat modeling of the assets.

We make it in an automatized way.

We have access to privilege data.

Our Intelligence is available for Executive Level aswell as for Security Specialists.

sally business