This is some text inside of a div block.
1
2
3
4
5
6
Select Service
What does a penetration test or vulnerability scan cost? Select the primary security service you're interested in to get a price estimate.
Help about
Penetration test
Simulates real-world attacks to find security weaknesses in your systems or applications before hackers exploit them. Helps you understand your security risks. More in-depth than a scan.
Help about
Vulnerability Scan
Uses automated tools to quickly scan your systems for known vulnerabilities, common configuration errors, and potential security gaps. Provides a broad overview but is less thorough than a pentest.
Help about
Red Teaming
A realistic, goal-based simulation mimicking a specific type of attacker (e.g., ransomware group) to test how well your organization DETECTS and RESPONDS to a real attack. Tests people, processes, and technology together.
Help about
Security Training
Provides security training tailored for your staff. Topics range from basic security awareness for everyone to specific secure coding techniques for developers.
Next Step
1
2
3
4
5
6
Penetration test
What Area Needs Pentesting?
Choose the type of system or application you need tested.
Help about
Pentest of Web Application
Focuses on finding vulnerabilities in your websites, web applications (like online portals or SaaS), and the backend APIs (data connections) they use.
Help about
Pentest Network / Infrastructure
Tests the security of your network components like servers, firewalls, internal networks (including Active Directory), and cloud infrastructure setups (AWS, Azure, GCP).
Help about
Pentest of Mobile Application
Specifically looks for security flaws in your mobile apps (for iOS or Android) and how they handle data and connect to backend servers (APIs).
Help about
Pentest of something else
Choose this if your testing needs are unique (e.g., specific hardware, IoT devices, operational technology, or a complex custom system). We'll need to discuss the scope.
Vulnerability Scan
What Do You Need Scanned?
Choose the type of automated vulnerability scan.
Help about
Web Application Scan
Uses automated tools to scan websites and web applications for common, known vulnerabilities like outdated software components, cross-site scripting (XSS), or SQL injection flaws.
Help about
Network/Infrastructure Scan
Uses automated tools to scan servers, workstations, firewalls, and other network devices for known vulnerabilities (like missing patches), open ports, and common misconfigurations.
Help about
Cloud Configuration Scan
Uses automated tools specifically designed to check the configuration and security settings of your cloud platform resources (e.g., AWS S3 buckets permissions, Azure security groups, GCP IAM roles) against benchmarks.
Red Teaming
Red Teaming: Focus & Objective
Define the high-level goals for this attack simulation.
What is the primary Environment targeted?
Help about
Primary Target Environment
Select the environment where the main goals of the simulated attack lie. Where are the 'crown jewels'?
Help about
Mainly Internal Network / On-Prem
The simulation primarily targets assets, users, and data located within your company's internal network and physical premises.
Help about
Mainly Cloud Environment
The simulation primarily targets assets, users, configurations, and data within your cloud environments (AWS, Azure, GCP, etc.).
Help about
Hybrid (On-Prem & Cloud)
The simulation targets assets across both your on-premise and cloud environments, potentially focusing on exploiting connections or weaknesses between them.
What is the primary Objective of this engagement?
Help about
Red Team Objective
Red Teaming is usually goal-oriented. What's the main thing you want to test or find out?
Help about
Test Detection & Response
Main goal is to see if your security team (Blue Team) or monitoring tools (like EDR/SIEM) effectively detect and respond to the simulated attack tactics.
Help about
Achieve Specific Goal(s)
Main goal is for the Red Team to try and achieve a specific objective, like gaining Domain Admin control, accessing specific critical data ('crown jewels'), or demonstrating impact.
Help about
Assess Overall Posture
A broader goal to understand overall resilience to a realistic attack path, without one single objective being paramount.
Security Training
Training: Select Course Topic
Choose the main topic for the security training course.
What is the focus of the Training?
Help about
Course Focus
Choose the primary topic that best fits your training needs for this session.
Help about
Medvetenhetsträning
Grundläggande säkerhetsutbildning lämplig för alla anställda. Täcker igenkänning av nätfiske, starka lösenord, social engineering-risker, säkert surfande och allmän säkerhetshygien.
Help about
Secure Development Training
Training specifically for software developers/engineers. Focuses on writing more secure code, understanding common web/API vulnerabilities (e.g., OWASP Top 10), secure design principles, and using security tools. Typically more hands-on.
Help about
Custom Workshop/Training
Need training on a specific topic? We can tailor content to your tech stack, industry (e.g., healthcare, finance), internal policies, or recent security incidents. Estimate is a placeholder; scope requires discussion.
Any specific wishes for Secure Development focus areas?
Help about
Dev Focus Wishes
While the course covers core secure coding principles (like OWASP Top 10), let us know if you have specific areas you'd like emphasized (e.g., specific vulnerability types, tooling). We'll accommodate where possible within the standard curriculum. This selection does not change the estimate.
Go back
Next Step
1
2
3
4
5
6
Web App: Scope & Complexity
Tell us about the web application to help estimate the testing effort.
Pentesting
Web Application
What kind of web application is it?
Help about
Application Kind
Understanding the basic structure helps us tailor the test approach.
Help about
Standard
Like a typical company website, online portal, or system with user accounts and various sections/pages where the browser often loads new pages.
Help about
API Only
This is just the 'engine' that provides data to a mobile app or another front-end, without its own visible website pages for users to interact with directly.
Help about
SPA
Feels more like a desktop application inside the browser; content changes dynamically without full page reloads often (e.g., Gmail, Facebook interface).
Roughly how many unique pages or key features does it have?*
Help about
Number of Endpoints/Features
Think of 'endpoint' or 'feature' as a distinct page or function. Example: Home page, About Us, Contact Form, Login page, User Profile, Product Search, Shopping Cart = 7 items. For APIs, count each main action (e.g., 'get users', 'create order'). Don't worry about being exact, a rough estimate is fine. This helps us understand the size.
1-20: +950 for each
21-50: +500 for each
51-100: +360 for each
1
0
10
20
30
40
50
60
70
80
90
100+
How many different user types (roles) with different permissions does it have?
Help about
Number of Authorization Levels
Count distinct permission levels, not individual people. Examples: 1. Public visitor (no login). 2. Logged-in standard customer. 3. Content editor. 4. Full administrator. This example has 4 roles. More roles mean more testing scenarios needed.
Number of Authorization Levels
What is the main purpose of this application?
Help about
Main Purpose
Knowing the main goal helps us understand the types of data and features that might be most sensitive or complex (e.g., payment processing in e-commerce, personal data in a portal).
Application type
Where does it run (Hosting Environment)?
Help about
Hosting Environment
Knowing where it's hosted can influence testing methods.
Help about
On-Premise
Runs on servers your company owns and manages in your own office or data center.
Help about
Cloud
Runs on services like AWS, Azure, or Google Cloud. Your company rents the server space.
Help about
Hybrid Hosting
It uses a mix of your own computers and cloud services.
PentestingENG
Network / Infrastructure
Network/Infra: Scope & Complexity
Tell us about the network or infrastructure environment.
What's the main environment we're testing?
Help about
Type of Infrastructure
Select the primary focus area for this infrastructure test.
Help about
Internal Windows Network (AD)
Testing your internal office network, servers, and how employee accounts are managed (often using Microsoft Active Directory).
Help about
Cloud Infra
Testing the setup and security of your systems running on platforms like Amazon Web Services, Microsoft Azure, or Google Cloud.
Help about
Hybrid Environment Pentest
Testing both your internal network and cloud setups, and how they connect securely.
Approx. Number of Employee Accounts or Work Computers?
Help about
Number of Users/Endpoints
Estimate the total number of *employee user accounts* OR *work computers (laptops, desktops)* within the part of the network being tested.
1-100: +70 for each
101-500: +50 for each
501-2200: +20 for each
1
0
200
400
600
800
1000
1200
1400
1600
1800
2000
2200+
Approx. Number of Servers in Scope?
Help about
Number of Servers
Estimate the total number of servers (Windows, Linux, etc. - the main computers running services) that are included in the scope of this test. Don't worry if it's not exact.
1-10: +500 for each
11-50: +270 for each
51-200: +110 for each
1
0
20
40
60
80
100
120
140
160
180
200+
Testing Perspective: Attack from Inside or Outside?
Help about
Testing Scope Perspective
From where should the simulated attacks originate? This defines the view of the test.
Help about
Utifrån (Externt)
Vi testar från internet, som en hackare som försöker bryta sig in utifrån. Vi ser bara det som är offentligt synligt för angripare.
Help about
Internal Scope
We test from *inside* your network, simulating someone who already has basic access (like a compromised employee account, guest WiFi, or a malicious insider). Assesses internal security.
Help about
Both (External & Internal)
Combines both perspectives for the most complete picture – trying to break in, and then seeing what damage can be done once inside. More comprehensive.
PentestingENG
Mobile Application
Mobile App: Scope & Complexity
Tell us about the mobile application to estimate the effort.
Which mobile platforms need testing?
Help about
Platforms
Select the operating systems your app runs on. Testing both takes significantly more time than testing just one.
Approx. how many main screens or core features?
Help about
Mobile Screens/Features
Count major sections or distinct activities in the app. Examples: Login, Registration, User Profile, Product List, Product Detail, Cart, Checkout Flow = 7 core items. A rough estimate helps gauge the app's size and complexity.
1-15: +550 for each
16-40: +250 for each
1
0
5
10
15
20
25
30
35
40+
Does the app talk to a backend API that also needs testing?
Help about
Mobile API Testing
Most apps connect to a server (API) to get/save data. Testing this connection and the API server itself is crucial for security but adds significant scope, similar to a web API test.
Help about
Yes API Test
Adds significant effort.
Does the app store sensitive data directly on the device?
Help about
Mobile Local Storage
Does the app save things like passwords, access tokens, personal details, financial info, or sensitive offline content directly onto the phone/tablet's storage? This requires specific checks.
Does the app use advanced device features?
Help about
Advanced Mobile Features
If the app interacts heavily with features like Fingerprint/Face ID (Biometrics), Bluetooth devices, Contactless Payments (NFC), precise GPS Location, Camera/Microphone in sensitive ways, testing these interactions adds complexity.
Help about
Yes Advanced Features
Adds testing complexity.
Pentesting
Other / Custom
Other / Custom Pentest
For unique targets like IoT, hardware, or specialised systems.

Since custom tests vary greatly, this estimate will be a rough starting point. We'll need a conversation to understand:

  • The specific system, device, or technology.
  • Your primary security concerns or goals.
  • What access or information can be provided.
  • Any specific compliance needs.
Vulnerability Scan
Scan Scope & Complexity
Define what and how the vulnerability scan should target.
Approx. Number of Scan Targets (IPs / Hostnames / URLs)?
Help about
Number of Scan Targets
How many unique targets should be scanned? Targets can be network addresses (IPs like 192.168.1.10), system names (like server.company.local), or website addresses (URLs like www.yourwebsite.com). Count each distinct system or site address. Give your best estimate.
1-50: +50 for each
51-250: +40 for each
251-1000: +30 for each
1
0
100
200
300
400
500
600
700
800
900
1000+
Scanning Perspective: From Inside or Outside?
Help about
Scan Scope Perspective
From where should the automated scanner access the targets?
Help about
External Scope for Scan
The scan targets systems reachable from the public internet (e.g., your public websites, external servers). Simpler setup.
Help about
Internal Scope for Scan
The scan targets systems only accessible from *within* your internal network. Often provides more findings but requires setup (e.g., VPN access or an internal scanner).
Help about
Both Scopes for Scan
Includes automated scanning from both the external (internet) perspective and the internal network perspective for broader coverage.
Can you provide credentials for authenticated scans (deeper results)?
Help about
Authenticated Scans
Scanning *with* safe, temporary login credentials (like a user account) allows the tool to see much more (like missing patches on logged-in systems). It provides significantly better results but requires coordination.
Help about
Yes Auth Scan
Allows deeper, more accurate scans.
Is special setup needed for internal scanning (VPN, Scanner)?
Help about
Internal Scan Setup
For scans inside your network, we might need special access (like a VPN) or for you to run a small 'scanner appliance' program on your side. Let us know if you anticipate needing extra setup steps.
Red Teaming
Red Teaming: Scope & Complexity
Provide details about the organization and allowed tactics.
Organization Size (Approx. Total Employees)?
Help about
Organization Size
Estimate the total number of employees in your organization. Larger organizations often have a larger 'attack surface' (more people for phishing, more systems). Your best guess is fine. Affects complexity.
0-900: +15 for each
1000-1100: +20 for each
1100-1800: +50 for each
1900-2000: +75 for each
1
0
100
200
300
400
500
600
700
800
900
1000
1100
1200
1300
1400
1500
1600
1700
1800
1900
2000
How mature are your security Detection & Response capabilities?
Help about
Detection Maturity
Do you have advanced tools monitoring for attacks (like EDR, NDR, SIEM) and/or a dedicated Security Operations Center (SOC) or Blue Team actively hunting threats? A more mature defense requires a more advanced (and costly) Red Team approach.
Help about
Basic Maturity
Standard endpoint protection, basic network firewalling.
Help about
Intermediate Maturity
Using Endpoint Detection & Response tools, centralized logging, maybe some basic alerting.
Help about
Advanced Maturity
Actively monitored Security Information & Event Management system, possibly a dedicated Security Operations Center (SOC) or Blue Team. Higher effort for Red Team.
Include attempts to gain Physical Access to buildings/servers?
Help about
Red Team Physical Access
Should the Red Team attempt to physically breach your facilities (e.g., offices, data centers) as part of the simulation (tailgating, lock picking etc)? Requires specific authorization and careful planning.
Help about
Yes Physical Red Team
Adds significant complexity and cost. Requires strict rules of engagement.
Include Phishing & Social Engineering tactics?
Help about
Red Team Phishing/SE
Should the Red Team use tactics like crafting fake emails (phishing), manipulative phone calls, or pretexting messages to try and trick employees into revealing information, running malware, or granting access? Tests human element and controls.
Help about
Yes Phishing/SE option
Tests user awareness and technical defenses (email filters etc.).
General Security Awareness
Training: Number of Attendees
Estimate the total number of participants for this training.
Number of Attendees
Help about
Number of Attendees
Estimate the total number of people participating. Price adjusts based on the number of attendees.
0: 0
1-10: +500
11-25: +400
26-50: +300
51-100: +250
1
0
10
20
30
40
50
60
70
80
90
100
Secure Development
Training: Number of Attendees
Estimate the total number of participants for this training.
Number of Attendees
Help about
Number of Attendees
Estimate the total number of people participating. Price adjusts based on the number of attendees.
0: 0
1: 0
2-10: +500
11: 1+14999
12-20: +400
21: 1+14999
22-100: +300
1
0
5
10
15
20
25
30
Custom Workshop/Training
Training: Number of Attendees
Estimate the total number of participants for this training.
Number of Attendees
Help about
Number of Attendees
Estimate the total number of people participating. Price adjusts based on the number of attendees.
0: 0
1-10: +500
11-25: +400
26-50: +300
51-100: +250
1
0
10
20
30
40
50
60
70
80
90
100
Go back
Next Step
1
2
3
4
5
6
Pentesting
Web Application
Web App: Optional Details
These options can affect the final scope and price.
How often do you plan to do this test?
Help about
Testing Frequency
Regular testing helps ensure new changes haven't introduced vulnerabilities. Discounts may apply for recurring tests.
Select Testing Frequency
Does this test need to meet specific compliance rules?
Help about
Compliance Requirements
Some regulations (like PCI DSS for credit cards, HIPAA for health info, GDPR for privacy) require specific checks or report formats. Let us know if this applies.
Compliance
Does the test need to start within two (2) weeks?
Help about
Expedited Timeline
Need the results really fast (e.g., for a product launch)? We can prioritize, but it usually costs more due to rescheduling and needing resources quickly. Standard turnaround allows for thoroughness without rush fees.
Help about
Expedited
This requires prioritizing your project and may involve extra fees.
Need a follow-up test & certificate after you fix issues (Retest)?
Help about
Retest + Certificate
After we report issues, you'll likely fix them. Do you want us to perform a focused follow-up test to confirm the main fixes and provide a clean 'certificate' or attestation? This adds extra time/cost to the project.
Pentesting
Network / Infrastructure
Network/Infra: Optional Details
Select additional options for the infrastructure pentest.
Physical tests?
Help about
Physical Access Testing
Should the test include attempts to physically enter your premises (office, data center) or access equipment without authorization (e.g., bypassing locks, tailgating)? This requires specific planning and permission.
Help about
Physical Access Testing
Requires specific planning & authorization. Adds scope.
How often do you plan to do this test?
Help about
Testing Frequency
Regular testing helps ensure new changes haven't introduced vulnerabilities. Discounts may apply for recurring tests.
Select Testing Frequency
Does this test need to meet specific compliance rules?
Help about
Compliance Requirements
Some regulations (like PCI DSS for credit cards, HIPAA for health info, GDPR for privacy) require specific checks or report formats. Let us know if this applies.
Compliance
Does the test need to start within two (2) weeks?
Help about
Expedited Timeline
Need the results really fast (e.g., for a product launch)? We can prioritize, but it usually costs more due to rescheduling and needing resources quickly. Standard turnaround allows for thoroughness without rush fees.
Help about
Expedited
This requires prioritizing your project and may involve extra fees.
Need a follow-up test & certificate after you fix issues (Retest)?
Help about
Retest + Certificate
After we report issues, you'll likely fix them. Do you want us to perform a focused follow-up test to confirm the main fixes and provide a clean 'certificate' or attestation? This adds extra time/cost to the project.
Pentesting
Mobile Application
Mobilapp: Övrigt
Välj ytterligare alternativ för mobilappstestet.
How often do you plan to do this test?
Help about
Testing Frequency
Regular testing helps ensure new changes haven't introduced vulnerabilities. Discounts may apply for recurring tests.
Select Testing Frequency
Does this test need to meet specific compliance rules?
Help about
Compliance Requirements
Some regulations (like PCI DSS for credit cards, HIPAA for health info, GDPR for privacy) require specific checks or report formats. Let us know if this applies.
Compliance
Does the test need to start within two (2) weeks?
Help about
Expedited Timeline
Need the results really fast (e.g., for a product launch)? We can prioritize, but it usually costs more due to rescheduling and needing resources quickly. Standard turnaround allows for thoroughness without rush fees.
Help about
Expedited
This requires prioritizing your project and may involve extra fees.
Need a follow-up test & certificate after you fix issues (Retest)?
Help about
Retest + Certificate
After we report issues, you'll likely fix them. Do you want us to perform a focused follow-up test to confirm the main fixes and provide a clean 'certificate' or attestation? This adds extra time/cost to the project.
Pentesting
Other / Custom
Other / Custom Pentest
For unique targets like IoT, hardware, or specialised systems.

A baseline 'Custom Project' fee is added. The final price depends heavily on the details discussed.

Vulnerability Scan
Scan Frequency & Reporting
Select how often scans should run and the reporting level needed.
Scanning frequency
Help about
Scan Frequency
How often should these automated scans run? Regular scanning helps detect newly discovered vulnerabilities or changes in your environment quickly. Discounts may apply for subscriptions.
Select scan frequency
Level of Scan Result Analysis Needed?
Help about
Scan Report Level
Automated scanners produce lists of potential issues. How much help do you need interpreting these results?
Help about
Analyzed Report
Includes the raw results PLUS our expert analysis to verify key findings, remove obvious false alarms, explain the risks in context, and prioritize what to fix first. Costs more due to manual effort.
Red Teaming
Red Teaming: Timeline & Frequency
Select timing options for the Red Teaming engagement.
Desired Engagement Duration
Help about
Red Team Engagement Timeline
How long should the active phase of the Red Team simulation run? Longer durations allow for more stealthy, persistent, and in-depth simulations that better mimic advanced attackers, but cost more.
Help about
Standard Timeline
A typical duration focused on achieving core objectives within a defined multi-week timeframe.
Help about
Extended Timeline
A longer engagement allowing the Red Team to simulate a more patient, persistent attacker, potentially spanning several weeks or months. Increases cost.
Is this a Recurring Engagement?
Help about
Red Team Frequency
Is this a one-time exercise, or part of an ongoing program of regular Red Team tests (e.g., yearly) to continuously measure and improve defenses over time? Discounts may apply for ongoing programs.
Help about
Recurring Program
Indicates potential for ongoing work, may affect pricing.
Security Training
Training: Delivery & Add-ons
Select delivery method and any optional add-ons.
Delivery Method
Help about
Delivery Method
How should the training be delivered to the participants?
Help about
Online / Remote
Training delivered via video conference (like Zoom, Teams) or our online platform. Attendees can join from anywhere. Most cost-effective.
Help about
On-site (at Your Location)
Instructor travels to your company location for in-person training. Estimate may not include travel/expenses, quoted separately.
Help about
Hybrid (Mix Online & On-site)
Accommodates both remote and in-person attendees simultaneously. Requires specific technical setup at your location.
Include an Assessment / Quiz / Certificate?
Help about
Assessment Add-on
Should the training conclude with a quiz or simple assessment to measure understanding? We can provide basic certificates of completion or scored results if desired. Adds minor cost.
Go back
Next Step
1
2
3
4
5
6
Summary & Price
Review the selections below. This is an initial estimate based on your inputs. A detailed quote requires confirmation.
Test group name:
Test group name:
Test Value
FROM:
XXX
SEK
Go back
Confirm price
1
2
3
4
5
6
Confirm price
Fill in the details bellow and we'll contact you to confirm the price
Message
Go back
Send
Thank you!

Thank you for your inquiry, we'll get back to you as soon as possible.

Oops, something went wrong. Please try again or contact us via e-mail.
No items found.
From
0
0
SEK

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript