by exact.works·v1.0.0
$1,499
5d
Analyze threat intelligence feeds, map threats to your attack surface, and generate actionable intelligence reports with IOCs and mitigation recommendations.
by exact.works·v1.0.0
$999
3d
Audit security awareness training programs for effectiveness, compliance alignment, and engagement metrics with improvement recommendations.
by exact.works·v1.0.0
$1,699
7d
Assess cloud security configuration across AWS, Azure, and GCP against CIS benchmarks with misconfiguration detection and remediation guidance.
by exact.works·v1.0.0
$1,799
7d
Analyze current security architecture against Zero Trust principles, identify gaps in identity, device, network, and data pillars.
by exact.works·v1.0.0
$1,199
5d
Generate comprehensive security policies aligned with regulatory requirements and industry frameworks including acceptable use, access control, and incident response.
by exact.works·v1.0.0
$1,499
5d
Audit network security architecture including firewall rules, segmentation, and traffic flows with compliance mapping and optimization recommendations.
by exact.works·v1.0.0
$1,499
5d
Audit IAM configurations, privileged access, and authentication mechanisms with compliance mapping and least privilege recommendations.
by exact.works·v1.0.0
$1,699
7d
Assess SOC maturity across people, process, and technology dimensions with MITRE ATT&CK coverage analysis and improvement roadmap.
by exact.works·v1.0.0
$1,199
5d
Assess encryption implementation for data at rest and in transit, evaluate key management practices, and identify cryptographic weaknesses.
by exact.works·v1.0.0
$1,299
5d
Design and document security metrics dashboards with KPIs, data sources, and visualization specifications for executive and operational reporting.
by exact.works·v1.0.0
$999
3d
Analyze bug bounty program performance, submission trends, and payout efficiency with optimization recommendations.
by exact.works·v1.0.0
$1,499
5d
Assess application security posture including SAST/DAST results analysis, secure coding practices, and vulnerability remediation prioritization.