Managed Cybersecurity Service

Leave the security of your network in our hands while you concentrate on your business. Our highly qualified cybersecurity experts take care of protecting your digital assets with customized and effective solutions.

Why do I need a Managed Cybersecurity service?

The day-to-day work in the IT department tends to consume most of your technology team’s time, giving little or no attention to the security of your environment.

Small staff and limited cybersecurity expertise are some of the reasons that put SMEs at a disadvantage against cybercrime.

Our serviceprovides you with an allied arm, with a team of highly trained professionals who will focus on the management and monitoring of the security status of your network. Whose sole objective is to reduce your risks and alleviate your concerns about your company’s IT security.

BENEFITS

  • Risk Reduction: our experts will be in charge of monitoring, detecting and mitigating threats.
  • Reduced Operational Costs: no more lengthy recruitment processes for cybersecurity personnel.
  • Increase your productivity: you focus on your business, we focus on your cybersecurity.
    Specialized Support: no long waits, just a click away.

How does it work?

#1

We gather your requirements and design a customized proposal.

#2

The service subscription is made. (Monthly, Semiannual or Annual)

#3

We take care of your Cybersecurity

#4

You will receive a monthly report of the most important findings.

Services

What we offer

Securing the perimeter or the line of communication between your network and the outside world be it the cloud or the internet is paramount as it is the gateway to the jewels of your kingdom (your information). For this reason we offer years of experience in perimeter security management and defense tactics, taking care of the partial or total administration of your Firewalls or UTM devices in conjunction with the different technologies that it incorporates.

Including:

Definition of Changes:

Minor changes:

  • Creation or modification of rules
  • Creation or modification of users

Major changes:

  • Cluster configuration.
  • Configuration of VPN Servers. (Site2Site/VPN Users)
  • Configuration of additional services, not activated in the firewall.

Having a view of what is happening within your environment is crucial to detect, analyze and mitigate anomalies. For this reason we offer you an advanced service, with the ability to correlate events from different sources, providing the security status of your devices.

Including:

The most valuable resource of any organization is its information. This information is distributed among different devices, from servers, user computers and mobile devices, for this reason, protecting these devices is paramount. Keeping the hands of cybercriminals away and this is the job of end-device security solutions. Whether you use traditional anti-malware solutions or much more advanced ones such as EDR/EDX, maintaining these solutions tends to be a herculean task for your IT analysts or technical support, with hundreds of alerts going unattended. Our service provides you with expert hands to securely manage and maintain your end device security platforms and the process of mitigating or remediating detected infections.

Including:

Every hour that passes, several vulnerabilities are reported to the various manufacturers, who put their teams of programmers to work to mitigate the vulnerabilities and release as quickly as possible the patches or updates to be applied to the various devices. However, studies have shown that most of the cyber-attacks were possible in companies of various sizes due to the lack of updating their equipment. Our service aims to help you manage this task, taking care of the management of your Operating System and Commercial Applications updates, applying them securely, after testing them in our own environments.

Including:

Requirements:

  • The customer must already have the solutions for its management.
  • The client must provide the credentials of the platforms that will be managed with the necessary permissions for the contracted activities.

Forms of Payment

choose your customized plan

We offer various forms of subscription, monthly, semi-annual and annual, to facilitate the payment process for our customers. This can be done by linking a credit card and authorizing its collection in the period you define or by bank transfer.

Bronze

Silver

Golden

Platinum

Small companies with a maximum of 1 firewall or firewall cluster and 20 devices including servers, PCs, laptops and mobiles.

Subscription

Monthly

500$

Includes:

Firewall management:

  • Once a week.
  • Maximum 5 minor changes per month.
  • 1 Major change.

Endpoint Security Management:

Subscription

Semiannual

2550$

(15% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 5 minor changes per month.
  • 1 Major change.

Endpoint Security Management:

Subscription

annual

4200$

(30% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 5 minor changes per month.
  • 1 Major change.

Endpoint Security Management:

Companies with a maximum of 2 branch offices and 2 firewalls (1 per branch office or 2 firewall clusters), and 50 endpoints including servers, PCs, laptops and mobiles.

Subscription

Monthly

1000$

Includes:

Firewall management:

  • Once a week.
  • Maximum 5 minor changes per week.
  • 1 major monthly change.

Endpoint Security Management:

Subscription

Semiannual

5100$

(15% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 5 minor changes per week.
  • 1 major monthly change.

Endpoint Security Management:

Subscription

annual

8400$

(30% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 5 minor changes per week.
  • 1 Major change.

Endpoint Security Management:

Companies with a maximum of 3 branch offices and 3 firewalls (1 per branch office or 3 firewall clusters), and 100 endpoints including servers, PCs, laptops and mobiles.

Subscription

Monthly

1500$

Includes:

Firewall management:

  • Once a week.
  • Maximum 10 minor changes per week.
  • 2 Monthly major changes.

Endpoint Security Management:

Security monitoring:

Subscription

Semiannual

7650$

(15% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 10 minor changes per week.
  • 2 Monthly major changes.

Endpoint Security Management:

Security monitoring:

Subscription

annual

12600$

(30% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 10 minor changes per week.
  • 2 Monthly major changes.

Endpoint Security Management:

Security monitoring:

Companies with a maximum of 4 branch offices and 4 firewalls (1 per branch office or 4 firewall clusters), and 200 endpoints including servers, PCs, laptops and mobiles.

Subscription

Monthly

2500$

Includes:

Firewall management:

  • Once a week.
  • Maximum 20 minor changes per week.
  • 2 Monthly major changes.

Endpoint Security Management:

Security monitoring:

Update Management:

Subscription

Semiannual

12750$

(15% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 20 minor changes per week.
  • 2 Monthly major changes.

Endpoint Security Management:

Security monitoring:

Update Management:

Subscription

annual

21000$

(30% discount)

Includes:

Firewall management:

  • Once a week.
  • Maximum 20 minor changes per week.
  • 2 Monthly major changes.

Endpoint Security Management:

Security monitoring:

Update Management:

Frequently Asked Questions

Yes, we have a number of security solutions, both OpenSource and commercial that we are happy to implement. We evaluate your needs, identify the right strategy and implement the solution, and then we take care of the management.

Yes, after performing the corresponding evaluation, we will design a proposal that fits your needs, and put together a Security as a Service package, in which you would pay a monthly, semi-annual or annual fee that would include the cost of the solution used, rental of our cloud service or on-premise hardware (firewall) and the management of the service or platform.

Yes, a contract will define the hybrid management of the solution, defining the responsibilities of each party and scope.

No, after evaluating the case, if it is determined that it is an emergency and the change will be made after coordination with the engineer in charge, additional changes to those defined in the contract will have an additional cost of $120/hour or fraction of an hour that the requested change or changes take, including the required tests.

No, at Gudix Security Consulting, we have a state-of-the-art security monitoring solution, which we offer as an added value at Gold and Platinum levels. However, if the client already has a solution, we will manage it as long as it does not exceed the number of nodes.

Yes, each case will be evaluated independently based on the client’s needs and a proposal will be provided.

We will analyze each case and evaluate if it requires an adjustment in the cost of the service or not, depending on the level of service and additional quantity.

No, our service is 8×5, Monday through Friday from 8:00 a.m to 5:00 p.m.

Yes, at the end of the month, we make an addendum to the contract for the service upgrade.

No, the whole process of solution management is remote, only in case the physical presence of one of our engineers is required, this will be previously planned, after analyzing the case.

click here

For more information about our services

We have not been able to validate your registration in the form, please check all fields, your internet connection and try again.
Your message was sent successfully, you will be attended by one of our consultants as soon as possible. Thank you for contacting Gudix Security Consulting.
The SMS field must contain between 6 and 19 digits and include the country prefix without "+" or "0" in front (e.g.: 34xxxxxxxxxxx for Spain).
?