How to Check CNIC Information Online with Pakdata cf
Have you been Hacked
1. Have You Been Hacked?
Before you respond with a resounding “no”, did you know that it takes on average
100 days for an organisation to discover that it’s been hacked? And that’s only IF
the company knows what it’s looking for.
How confident are you that you have not been hacked in the last week, month, year?
According to our research, the chances are good that you may already have been
breached. But how, and what can you do to ensure it doesn’t happen again?
Phase 3 : 1 Year - Annually Dependant – See table on following page
We fully deploy Intercept on all endpoints to allow us to proactively hunt for threats. We also configure all of your
endpoints to push the correct data and information to us in real-time. We begin threat hunting on your endpoints, to
identify and isolate any malicious activity. Additionally, you have access to a Purple Team that guarantees a 30-minute
response time to any threat detected on your network. And, they will continuously advise you on improvements that
can be made to the integrity of your network.
Our Approach
ACDS take a 3-phased approach in determining whether you have been hacked by utilising our own proprietary software – Intercept.
This software monitors not only your enpoints and human vulnerabilities but all aspects of your perimeter and network too.
Phase 1 : 2 Weeks - R 50 000.00 (ex VAT) – once off
At this stage, we integrate your network perimeters with Intercept and allow it to monitor your network for a period
of 2-weeks. From there, we are able to inform you whether you have any known malicious traffic coming into or going
out of the environment.
Phase 2 : 1 Month - R 100 000.00 (ex VAT) – Once off
In stage 2, we deploy the Intercept Network Platform throughout the organisation, to determine whether any
compromises or malicious activity is taking place within the environment. We then analyse and replay all network
traffic for a period of 30-days. Furthermore, we integrate data from firewalls, intrusion prevention systems, switches
and routers. This is not a typical SIEM system; it’s the Intercept Threat Hunting Platform that proactively detects and
monitors all devices in your business.
1
2
3
INTERCEPT THREAT HUNTING DOMAININTERCEPT THREAT HUNTING DOMAIN
INTERCEPT ALPHA SECURITY ENGINE
USER BEHAVIOUR
MONITORING
ENDPOINT
MONITORING
SERVER
MONITORING
FIREWALL
MONITORING
ROUTER
MONITORING
SWITCH
MONITORING
SECURE OUTBOUND VPN
UTILISING CLIENT EXISTING CONNECTIVITY
How Intercept Works: INTERCEPT
TEAM
CLOUD
SOC
2. Intercept License Pricing (per month)
Managed Services
Number of Endpoint Devices 1-300 301-500 501-700 701-1000 1000+
Per Perimeter Network Device
(Any device that connects to an external
network, Eg: routers, etc)
$ 100.00 $ 100.00 $ 100.00 $ 100.00 Contact Us
Per Endpoint Device
(Laptop, Table, mobile phone, server, etc)
$ 3.50 $ 3.41 $ 3.33 $ 3.24 Contact Us
Per Node
(Provide network-level threat detection,
anomaly detection, intrusion detection
& vulnerability analysis, & threat scoring)
$ 850.00 $ 828.75 $ 808.03 $ 787.83 Contact Us
Digital Forensic and Incident
Response License for 365-days
$ 1,550.00 $ 3,022.50 $ 4,533.75 $ 6,200.00 Contact Us
MSSP Standard SLA Unlimited SLA
Duration 1 year 1 year
Support Method Help desk / Phone / On site Help desk / Phone / On site
Response Time 30 Minutes for Premium Telephonic Calls 15 Minutes for Premium Telephonic Calls
Support Hours 24/7 24/7
Included Incidents1 100 Unlimited
Included Consulting Hours2 50 Unlimited
24/7 Threat Hunting, Rapid
Detection and Response
Yes Yes
Cost Per Year $ 69 950.00 On Request3
All pricing is subject to Ts & Cs specific to a clients environment.
Please chat to us for a more specific proposal dependent to your specific environment.
1. Pricing is based on 300 devices and 30-days worth of data storage in our cloud environment. Pricing is calculated on the amount of devices per year to ensure that we
provide the correct amount of cloud compute & storage required to support them. On this pricing tier, we assume the client has a SIEM or event logging platform to send the
data to, to store events and data for longer than 30 days.
2. One Node can support up to 350 devices, or one /24 subnet. This excludes any hardware required to run the software, or provide local storage, however hardware can be
speced and provided as required, depending on the size of the network. It can be virtualized if the client has a supported virtual platform. It can also run on cloud networks.
3. Extends the endpoint data storage from 30-days to 365-days, allowing us/the client to retrospectively hunt for threats. This price is calculated to provide the correct amount
of cloud compute and storage requirements for the size of the environment. Includes Intercept digital forensics suite, allowing anyone to hunt and carve digital forensic
artifacts and IOC’s, as well as provide active response, automation and orchestration to security incident response.
info@ACDS.email +27 87 073 9370 www.acds.io AMR Building 3, Concorde Rd E, Bedfordview, 2008