Recognizing that each organization possesses distinct characteristics, our testing procedures are customized to meet the specific needs of each organization. Consequently, pricing varies according to factors such as size, complexity, and other relevant variables.
We keep all scoping data and contracts for an indefinite period. Engagement data is deleted 14 days after the report is accepted to ensure privacy. Additionally, reports are securely stored in an encrypted format in hot storage for five years. After this period, they are archived indefinitely in cold storage.
We have a secure web portal for you to log in to. Once you log in, you will be able to view all the narratives, executive summaries, and findings. You can respond to each finding and upload evidence to demonstrate your mitigating controls. Additionally, you can download the report in PDF or Word format, and export the findings as Jira or ServiceNow tickets for implementation in your ticketing system.
Absolutely! In addition to our primary services, we engage in a variety of other projects that may align with your needs. If what you're looking for falls outside our scope, we can effortlessly connect you with a trusted partner firm at no cost to you. All you need to do is get in touch with us, and we’ll be happy to assist you in finding the right resources for your requirements.
We do have references and sample documents available; however, we handle these requests on a case-by-case basis to ensure the utmost care and confidentiality. Before we provide any references, we follow a strict protocol that includes two essential steps:
1) We always verify with the reference contact to confirm that they are comfortable providing feedback before proceeding with any request. This step is crucial to maintain the integrity of our relationships and to respect their privacy.
2) We also conduct due diligence on the organization making the request, including verifying that it is a legitimate entity and assessing the identity of the individual requesting the information. This is crucial in our commitment to protecting our clients.
We take our commitment to client privacy very seriously and do not wish to compromise in any area related to this. Additionally, we do not distribute sample reports unless we have thoroughly validated the identity of the requesting individual and confirmed that they represent a credible organization. Our goal is to ensure that any shared information is safeguarded and used appropriately.