Vulnerability scanning for 1 IP/Domain
Cybersecurity policy template (up to 2)
Access to high quality Training contents
High quality vulnerability database for scanning
Manual verification of Vulnerability scan report
Cybersecurity training
Vulnerability management
Set of policies for company needs