by exact.works·v1.0.0
$799
3d
NERC CIP incident reporting assistance covering event classification, timeline documentation, and filing preparation.
by exact.works·v1.0.0
$1,799
7d
Analyze penetration test findings, categorize vulnerabilities by severity and exploitability, and generate prioritized remediation roadmaps with technical guidance.
by exact.works·v1.0.0
$1,499
5d
Comprehensive vulnerability scanning and analysis across network infrastructure, applications, and cloud environments with risk-based prioritization.
by exact.works·v1.0.0
$1,999
7d
Develop comprehensive incident response plans aligned with NIST guidelines, including playbooks, communication templates, and escalation procedures.
by exact.works·v1.0.0
$1,999
7d
Assess organizational security posture against NIST Cybersecurity Framework, identify gaps across all functions, and create implementation roadmaps.
by exact.works·v1.0.0
$1,499
5d
Analyze threat intelligence feeds, map threats to your attack surface, and generate actionable intelligence reports with IOCs and mitigation recommendations.
by exact.works·v1.0.0
$999
3d
Audit security awareness training programs for effectiveness, compliance alignment, and engagement metrics with improvement recommendations.
by exact.works·v1.0.0
$1,799
7d
Assess organizational preparedness against ransomware attacks, evaluate backup strategies, and develop recovery playbooks with RTO/RPO analysis.
by exact.works·v1.0.0
$1,699
7d
Assess cloud security configuration across AWS, Azure, and GCP against CIS benchmarks with misconfiguration detection and remediation guidance.
by exact.works·v1.0.0
$1,799
7d
Analyze current security architecture against Zero Trust principles, identify gaps in identity, device, network, and data pillars.
by exact.works·v1.0.0
$1,199
5d
Generate comprehensive security policies aligned with regulatory requirements and industry frameworks including acceptable use, access control, and incident response.
by exact.works·v1.0.0
$1,299
5d
Assess third-party vendor security posture through questionnaire analysis, SOC 2 report review, and risk scoring with ongoing monitoring recommendations.