Solid risk management is priceless… and we help you get there at a limited cost. Below you'll find our pricing for businesses, at any stage. Chat with us to find the solution that works for you!
FREE
Get started with risk management, experience digital TPRM, explore our platform, free!
/month
Audit your key suppliers, follow up on risks to ensure business continuity
Experience how our service works with 1 supplier
Unlimited questionnaire-based digital assessments
CIS, NIS, NIST, and ISO templates
Customizable questionnaires
Monthly automated supplier scans
Monitor your digital footprint and identify weaknesses in your cybersecurity defenses and with your vendors
Monthly scans for one domain, plus your supplier
Digital footprint mapping & monitoring
Automated security risk rating
Starter
Everything to get an SME started with the identification and management of security (and other) risks.
/month, billed annually (excl. Professional Services)
Audit your key suppliers, follow up on risks to ensure business continuity
Manage up to 5 suppliers
Unlimited questionnaire-based digital assessments
CIS, NIS, NIST, and ISO templates
Customizable questionnaires
Monthly automated supplier scans
Platform access for 1 user
Monitor your digital footprint and identify weaknesses in your cybersecurity defenses and with your vendors
Monthly scans for one domain (unlimited hosts), plus your suppliers
Digital footprint mapping & monitoring
Automated in-depth security risk analysis and reporting
We unburden your security and compliance teams by outsourcing tasks to an expert. The 360° package includes the standard Starter service plus:
Third Party Onboarding Support
We take care of onboarding your suppliers and follow up of assessments from A to Z.
Penetration Tests
A Ceeyu ethical hacker performs penetration tests on 1 selected host.
Essential
The subscription level for SMEs with a strong digital presence and/or extensive process automation.
/month, billed annually (excl. Professional Services)
Audit the security of your key suppliers to ensure business continuity
Manage up to 12 suppliers
Unlimited questionnaire-based digital assessments
CIS, NIS, NIST, and ISO templates
Customizable questionnaires
Monthly automated supplier scans
Platform access for 3 users
Monitor your digital footprint and identify weaknesses in your cybersecurity defenses and with your vendors
Weekly scans for 5 domains (unlimited hosts), plus your suppliers
Digital footprint mapping & monitoring
Automated in-depth security risk analysis and reporting
Active vulnerability scanning
Unburden your security and compliance teams by outsourcing tasks to an expert. The 360° package includes the standard Essential service, plus:
Third Party Onboarding Support
We take care of onboarding your suppliers to your TPRM program from A to Z.
Penetration Tests
A Ceeyu ethical hacker performs penetration tests on 2 selected hosts.
Periodic Risk Review
In recurring sessions with your security teams, we review the results of our scans, pinpointing key security risks.
Ask a Security Expert
Submit the most pressing security questions to our experts with a 24h response time.
Enterprise
The package that caters for the cybersecurity needs of a typical large enterprise
Audit your key suppliers, follow up on risks to ensure business continuity
Manage up to 50 suppliers
Unlimited questionnaire-based digital assessments
CIS, NIS, NIST, and ISO templates
Customizable questionnaires
Monthly automated supplier scans
Platform access for 10 users
Monitor your digital footprint and identify weaknesses in your cybersecurity defenses and with your vendors
Weekly and ad hoc scans for 10 domains (unlimited hosts), plus your suppliers
Digital footprint mapping & monitoring
Automated in-depth security risk analysis and reporting
Active vulnerability scanning
Unburden your security and compliance teams by outsourcing tasks to an expert. The 360° package includes the standard Enterprise service, plus:
Third Party Onboarding Support
We take care of onboarding your suppliers to your TPRM program from A to Z.
Penetration Tests
A Ceeyu ethical hacker performs penetration tests on 5 selected hosts.
Periodic Risk Review
In recurring sessions with your security teams, we review the results of our scans, pinpointing key security risks.
Ask a Security Expert
Submit the most pressing security questions to our experts with a 24h response time.