Pick a Plan that Works for Your Business Model

Our vulnerability scan pricing options are fully transparent with no hidden fees!

Websites

How many websites or web applications you have externally facing that you need to have scanned from an unauthenticated perspective.

Hosts

A ‘host’ refers to any device, such as a computer, server, printer, router, or phone, connected to a network that you want to have tested for vulnerabilities.

 

How many websites do you have to scan?

Website

How many hosts do you have to scan?

Hosts

Basic

See Your External Attack Surface

£ 10 /m
  • Password Breach Checks
  • Leaked Data Checks
  • External Scans
  • Internal Scans
  • Full Vulnerability Reports
  • Recommended Fix Lists
  • Weekly Scan
  • Remediation Scans
  • Rapid Response
  • False Positive Checks
Recommended

Advanced

Basic + Internal Scanning

£ 30 /m
  • Password Breach Checks
  • Leaked Data Checks
  • External Scans
  • Internal Scans
  • Full Vulnerability Reports
  • Recommended Fix Lists
  • Weekly Scan *
  • Remediation Scans
  • Rapid Response
  • False Positive Checks

Enterprise

Advanced + Continuous Scanning

£ 50 /m
  • Password Breach Checks
  • Leaked Data Checks
  • External Scans
  • Internal Scans
  • Full Vulnerability Reports
  • Recommended Fix Lists
  • Unlimited Scans *
  • Remediation Scans
  • Rapid Response
  • False Positive Checks

Options Explained

Password Breach Checks

Searching public databases and repositories of known data breaches. Checking if any breaches have affected you.

Leaked Data Checks

Monitoring underground forums, marketplaces, and dark web sources where stolen data is traded. We check for mentions of your business, domains, or email addresses to identify any leaked credentials or data breaches.

External Scans

Testing your externally facing IP addresses and domain names.

Internal Scans

Testing of your hosts that reside on your internal network.

Full Scan Reports

The full vulnerability scan report will be provided.

Fix Lists

This service is where we manually review the results and provide a separate report detaling which findings you should address as a priority. This saves you time, allowing you to focus on fixing what truly matters.

Scan Frequency

Our Basic Package supports 1 External Scan per week.

Our Advanced Package supports 1 External Scan per week, and 1 Internal Scan per month.

Our Enterprise Package supports Unlimited External Scans, and up to 4 Internal Scans per months.

Remediation Scans

If you have just fixed a vulnerability by applying a missing update, or making a configuration change as recommended, this options allows you to scan that vulnerability to confirm your remediation efforts were succesful.

Rapid Response

We will aim to respond as quickly as possible to all queries. For those with Rapid Response support, your queries will be raised with a higher priority and dealt with quicker.

False Positive Checks

Automated scanning tools are great. There are times however, when these tools can produce false positives. This addon means a manual check will be performed by a human to confirm all vulnerabilities mentioned in the report have been validated.

Frequently Asked Questions

We’ve got you covered!

What is a host?

A host or IP address is like a unique identifier for a device, such as a computer or server, on a network. It’s similar to a phone number or home address for your computer in the digital world. When conducting a vulnerability scan, we use these addresses to locate and assess potential weaknesses in the security of the device. This information helps identify areas that could be exploited by attackers, allowing us to strengthen defenses and keep the digital environment safe.

Monthly vs Unlimited Scans?

Monthly vulnerability scans offer a regular checkup for a business’s digital infrastructure, helping identify and address potential security weaknesses.

On average, new vulnerabilities get exploited within 2 weeks when they’ve gone public!

These scans provide a baseline understanding of the system’s security posture and ensure ongoing protection against known vulnerabilities.

However, for businesses deploying new software or devices frequently, unlimited and continuous scanning becomes crucial.

Our Reports?

When you partner with us, you not only receive the full Nessus vulnerability scan reports in a user-friendly PDF format but also gain access to a specialized vulnerability spreadsheet, designed to streamline your remediation efforts.

What sets us apart:

Detailed PDF Reports: Dive into the intricacies of your security landscape with our detailed Nessus vulnerability scan reports presented in a clear and accessible PDF format. Unearth vulnerabilities, understand their implications, and make informed decisions to fortify your digital defenses.

Remediation-Focused Spreadsheet: Tackling vulnerabilities head-on becomes seamless with our specially crafted vulnerability spreadsheet. Tailored to assist in your remediation efforts, this spreadsheet provides a structured and organized overview, empowering you to prioritize and address security concerns efficiently.

Prioritized Action Plan: For Pro and Enterprise Users, we go a step further by delivering a prioritized report that cuts through the noise. Highlighting which issues demand immediate attention, this focused document ensures that your team can swiftly address the most critical vulnerabilities, fortifying your security posture strategically.

Client-Facing Versions: Your convenience is our priority. Upon request, we provide client-facing versions of all reports. Present a polished and professional summary to stakeholders, enhancing transparency and fostering a collaborative approach to cybersecurity within your organization.

What Tools Do We Use?

Harnessing the power of industry-leading tools such as OpenVAS, DeHashed, Nuclei, and our proprietary in-house arsenal, we meticulously evaluate your assets. This dynamic combination ensures a comprehensive and robust analysis, safeguarding your digital footprint with unparalleled precision.

Why Use NetDefenders?

Embark on a transformative vulnerability scanning journey with us, where excellence meets affordability. Unlike high-priced competitors or licensing costs, we not only ensure cutting-edge vulnerability scanning but also take the reins in scheduling, running, maintaining and prioritising the results to be fixed throughout the entire process.

Websites vs Hosts?

Hosts and IP Addresses are tested differently to web applications.

Hosts are tested from a networking perspective.

Understanding the ports and services that are in use, looking for any misconfigurations or patching deficiencies, and running vulnerability scans to see if there are any known vulnerabilities.

Websites and web applications are tested to check for common web vulnerabilities. These are done from an unauthenticated perspective, but include looking for vulnerabilities as outlined on OWASP. Web Application vulnerabilities can lead to compromising your users, taking your applications offline or defacing them, recovering sensitive information, or even leading to fully compromising to achieve access to the underlying server.

It is recommended to test your websites / web applications from both a networking and web application perspective.

If you have 1 website to be tested, this would count as 1 website and 1 host.

Still have questions?