We deliver proactive cyber security support to protect your business from evolving threats. Our team focuses on prevention, rapid incident response, and continuous improvement to keep your systems, data, and networks secure.
With transparent reporting, best-practice security management, and dedicated expert support, we ensure reliable protection and peace of mind—so you can focus on your business.
Firewall & network security management
Endpoint protection & antivirus monitoring
Server & data security hardening
Vulnerability assessment & risk mitigation
Email & web security (phishing & malware protection)
Security monitoring & incident response
Patch management & security updates
Compliance & security best-practice support
Choose the right level of network support based on your business needs.
🥈 Silver Plan – For Small Businesses
Essential cyber security protection for small offices with basic IT infrastructure.
Firewall & endpoint security
Antivirus monitoring
Patch & update management
Limited incident response
Quarterly security reports
Starting from ₹25,000 / Year
🥇 Gold Plan – For Growing SMBs
Advanced protection for businesses with servers, remote access, and higher security needs.
Firewall & VPN management
Endpoint & server security
Vulnerability assessment
Faster incident response
Monthly security reports
Starting from ₹60,000 / Year
24/7 security monitoring
Advanced threat detection & prevention
Priority incident response (SLA-based)
Compliance & audit assistance
Dedicated security expert
(Without AMC)
For businesses without an active AMC, we provide emergency on-site cyber security support to address critical incidents and restore operations quickly.
Cyber security incident investigation
Malware / ransomware response
Firewall & network issue resolution
Server security issues
Data breach containment support
On-site support on call-out basis
Charged per visit / per day
Priority scheduling subject to availability
₹5,000 – ₹10,000 per visit (local area)
₹15,000+ per day (complex incidents)
Travel & accommodation (if applicable) charged extra
Emergency support is best-effort only and does not include continuous monitoring or preventive security controls.
For long-term protection, we strongly recommend our Cyber Security Support AMC plans.
All prices are exclusive of GST and applicable taxes.
AMC pricing is based on the number of users, endpoints, servers, firewall type, and security scope.
Any new devices, servers, locations, or services added during the AMC period will be charged additionally.
Emergency on-site support without AMC is provided on a best-effort basis and billed separately.
Travel, lodging, and outstation expenses (if applicable) will be charged extra.
AMC does not include new hardware, software licenses, or third-party subscriptions, unless explicitly mentioned.
Service availability and response time are governed by the agreed SLA.
Payment terms: 100% advance annually / Quarterly billing (if agreed).
AMC validity is for 12 months from the start date.
Scope changes or additional security requirements may require a revised commercial proposal.
Our Cyber Security Support Services are delivered in alignment with industry-recognized best practices and applicable regulatory requirements. We follow structured security processes to help organizations protect information assets, maintain system integrity, and reduce cyber risk.
Our services support compliance with widely accepted standards and guidelines, including (where applicable):
ISO/IEC 27001 information security best practices
CERT-In cyber security guidelines
IT Act, 2000 and applicable Indian cyber regulations
Data protection and confidentiality requirements
Client-specific internal security policies
While our services assist in meeting compliance requirements, final compliance responsibility remains with the client, including regulatory filings, audits, and certifications.
We are committed to maintaining confidentiality, integrity, and availability of client systems and data throughout the service engagement.
The purpose of this SOP is to define the standard process for delivering consistent, secure, and effective cyber security support services. This ensures protection of client systems, data, and networks while minimizing cyber risks and operational disruption.
This SOP applies to all cyber security support activities, including firewall management, endpoint protection, server security, monitoring, incident response, and compliance support provided under AMC or on-demand services.
Cyber Security Engineer: Monitoring, configuration, incident handling
Support Lead: Escalation handling, SLA compliance
Account Manager: Client communication, reporting, renewals
Client IT Contact: Coordination, approvals, internal access
4.1 Preventive Security Management
Firewall & network security configuration
Endpoint protection & antivirus monitoring
Server hardening & access control
Patch and update management
4.2 Monitoring & Alerts
Continuous security monitoring (as per plan)
Log review and suspicious activity detection
Threat alerts and risk identification
4.3 Incident Response
Incident identification & classification
Immediate containment actions
Root cause analysis (RCA)
Recovery & system restoration
Incident reporting
4.4 Vulnerability Management
Periodic vulnerability assessment
Risk analysis & prioritization
Remediation recommendations
Issue detected (monitoring / user report)
Ticket logged & severity assigned
Initial response within SLA
Troubleshooting & containment
Resolution & validation
Documentation & report sharing
Critical: Immediate / priority response
High: Same business day
Medium: Next business day
Low: As scheduled
(Exact SLA depends on AMC plan)
Monthly / Quarterly security reports
Incident & RCA reports
Patch & update status
Security improvement recommendations
Adherence to ISO 27001 best practices
Compliance with IT Act & CERT-In guidelines
Strict confidentiality of client data
Access provided strictly on need-to-know basis
Hardware replacement
Software license procurement
Third-party service failures
Non-security IT support (unless included in AMC)
This SOP is reviewed periodically to align with evolving cyber threats, regulatory changes, and technology updates.