Combi Deal (scans and pentest)

7,6997,999

  • Choice between monthly or weekly scans
  • 5-Day greybox pentest within the year of the licence
  • Licence is valid for 1 year, covering one URL
  • Price includes 50% discount on the scans
  • Prices are excluding VAT
Description

Enhance your security with one of our Gold licences, combining monthly or weekly scans with a comprehensive five-day penetration test. Conducted within the licence period, this greybox pentest is performed with partial knowledge of the target system. This balanced approach provides a detailed assessment of your (web)application, detecting any vulnerabilities throughout the year.

Our Gold licences are valid for 1 year and cover 1 URL. They include:

  • Choice between 12 scans (Gold) or 52 scans (Gold+)
  • Scheduling of scans and timing of pentest in consultation
  • Pentest led by expert ethical hacker
  • Encrypted pentest report in PDF-format
  • Choice between encrypted PDF or HTML report for scans
  • Support for questions on all detected risks
  • Unlimited rescans after solving high risks (not applicable for pentest)
  • With a safe result you can feature our secure logo on your website. Read more >

At the end of the term, the licence period will be automatically extended by 12 months. We have a notice period of 1 month before the end of the licence.

Work method scans
  • Announcement

    Timing and preparation details are provided well in advance via email.

  • Assessment

    We manually assess the web application to optimise the configuration of the scanner.

  • Fine-tuning

    With a discovery scan we test our login script to the account and limit similar pages from the scan.

  • Flexibility

    You have the option to inform us of your preferred date and start time.

  • OWASP Top 10

    SSL and known vulnerabilities are tested, such as Cross-Site Scripting (XSS) and SQL injections.

  • Duration

    Depending on the size of the application, the scan may take up to 25 hours to complete.

  • Review results

    We manually evaluate the results to ensure its successful completion.

  • Report

    You will receive a secure, detailed report. It can be provided in either PDF or HTML format.

  • Check fixes

    Consider requesting a rescan to verify addressing at least the high risks (this may incur additional costs).

Work method pentest
  • Timing

    Together, we will determine a start date. For starting dates within 2 weeks, please contact us first.

  • Scope

    We define your goals beforehand to ensure a thorough understanding of your specific security objectives.

  • Mapping

    Mapping helps us in understanding the application, enabling us to determine which tests are necessary.

  • Assessment

    Both automated tools and manual techniques are used to identify weaknesses in the application.

  • Human logic

    By using human logic, our hackers can find weaknesses that automated systems may overlook.

  • Structured

    We rely on the Penetration Testing Execution Standard (PTES) to structure and streamline our testing process.

  • Results

    Our ethical hacker will collect all findings and assign a risk level (high, medium, and low) to each identified vulnerability.

  • Report

    A detailed, custom report will provide a substantiated analysis of the findings and recommendations for improvement.

  • Retest

    It is advisable to perform a targeted test to verify the resolution of vulnerabilities (available at additional charge).