by exact.works·v1.0.0
$1,799
7d
Assess organizational preparedness against ransomware attacks, evaluate backup strategies, and develop recovery playbooks with RTO/RPO analysis.
by exact.works·v1.0.0
$1,699
7d
Assess cloud security configuration across AWS, Azure, and GCP against CIS benchmarks with misconfiguration detection and remediation guidance.
by exact.works·v1.0.0
$1,799
7d
Analyze current security architecture against Zero Trust principles, identify gaps in identity, device, network, and data pillars.
by exact.works·v1.0.0
$1,199
5d
Generate comprehensive security policies aligned with regulatory requirements and industry frameworks including acceptable use, access control, and incident response.
by exact.works·v1.0.0
$1,299
5d
Assess third-party vendor security posture through questionnaire analysis, SOC 2 report review, and risk scoring with ongoing monitoring recommendations.
by exact.works·v1.0.0
$999
3d
Analyze phishing simulation campaign results, identify high-risk user groups, and generate targeted training recommendations.
by exact.works·v1.0.0
$1,499
5d
Audit network security architecture including firewall rules, segmentation, and traffic flows with compliance mapping and optimization recommendations.
by exact.works·v1.0.0
$1,299
5d
Assess endpoint protection deployment coverage, configuration effectiveness, and detection capabilities with hardening recommendations.
by exact.works·v1.0.0
$1,499
5d
Audit IAM configurations, privileged access, and authentication mechanisms with compliance mapping and least privilege recommendations.
by exact.works·v1.0.0
$1,699
7d
Assess SOC maturity across people, process, and technology dimensions with MITRE ATT&CK coverage analysis and improvement roadmap.
by exact.works·v1.0.0
$1,299
5d
Audit DLP implementation effectiveness, policy coverage, and data classification alignment with gap analysis and tuning recommendations.
by exact.works·v1.0.0
$1,199
5d
Assess encryption implementation for data at rest and in transit, evaluate key management practices, and identify cryptographic weaknesses.