Threat Intelligence
In this service, we provide you with an intelligence system in the field of cyber security. We enable you to configure your security applications with current threats and threat models. The most common customer requests we encounter in this field are usually Wazuh and Squid proxy server integrations. However, we can provide integration with all other integrators. In this regard, we offer you a good API interface design and an architectural structure that will ensure communication in this area.
1
Project Base Contract
In this type of agreement, you can receive this service as a project. You don't have to pay a fee every month, so you save money and time by spending your time only on necessary and needed projects.
2
Outsource Security Engineer
In this type of agreement, a Security engineer is assigned to you and works with you within the period you specify. There is no project limit for this type of agreement.
3
B2B Self Contractor
A Security engineer is assigned to you in return for receiving this service. This type of agreement will come at a much more affordable cost to you in long-term agreements. Also, if you want to work with another System engineer, a new System engineer will be assigned to you.
4
Time Base Consultancy
In this type of service, we provide a time-oriented agreement with our customers. We calculate how long the project will take for you and you only pay hourly. It does not have any time. The agreement ends when the time is up. In this way, you get as much service as you need and you pay your fee at the end of the project as you receive service.
Let's Work Together
This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content.