EAGLE SHARK
CYBER DEFENCE
Beat the Hackers to the Punch!
Get tested with a professional penetration test
See More
Make management and employees mentally and physically prepared for a future IT attack
See More
See More
Preventive services and 24/7 incident response at a fixed low price
See More
Prevent hacker attacks!Get a risk assessment of the company´s enviroment
Gør som mange andre virksomheder, indgå et samarbejde med os.
Vi hjælper jeres virksomhed før, under og efter et angreb.
Alle services og software er samlet i en fast lav månedlig ydelse, som betyder at du kender dine omkostninger
Do as many other companies do, enter into a partnership with us.
We help your company before, during and after an attack.
All services and software are included in a fixed low monthly payment, meaning you know your costs.
Purchase
6 H
4 D
Our license agreement has three primary services. We measure the company's resilience against potential cyber attacks. We perform optimization of the company's IT security and a 24-7-365 incident response.
Read more about what the License Agreement contains:
Safe and professional negotiation in case of ransomware attacks, risk mitigation in case of ransom payments, transparent communication, communication log for insurance, training and building of crisis teams, strategic crisis communication, regaining trust from the public, press and customer handling, Crypto account, 100% transparency, access to Crypto currency, compliance check, IT security consultants, insurance matters, fast response time, and experience with ransomware.
3 D
8 H
16 H
Purchase
Purchase
+10 M
5 M
1 M
20.000 dkk/y
5.000 dkk/y
from 8.800 dkk/y
from 16.800 dkk/y
from 12.000 dkk/y
55.000 dkk/y
10 H
5 H
from 2.200 dkk/y
16.800 dkk/y
The workshop outfits the company's management and crisis team for a possible future attack.
The team will go home with a revised crisis plan based on "best practices" at the operational and strategic level.
The workshop makes management aware of any vulnerabilities in the current crisis readiness.
Do you wish for the workshop to be included in your license agreement?
Please check our license agreement.
You can order a workshop without a license agreement. The price from DKK 7.500,-
LICENSE AGREEMENT
BOOK
BOOK
The best price is obtained by choosing a certified license agreement, where the workshop is included in the price.
Press the button below to read more about the license agreements.
Have you checked out our free version of CRA? Click here!
Red Team
A so-called "Red Team" attack is a physical and digital penetration, which is carried out by making use of "ethical hacking skills" and "Social Engineering". The company's employees receive no notice of a "Red Team attack" and must therefore handle this as a real illegal intrusion into the company. The goal is to test the organization's detection and response capabilities. The Red Team will try to gain access to sensitive information in every way imaginable. A "Red Team" team typically consists of several different specialists, all of whom have many years of experience in the field. The team's background is in the armed forces, including the Danish Special Forces, the services and diplomacy.
Pentest
A pen test, also known as a penetration test, is a simulated cyberattack that is carried out by security experts with the aim of finding vulnerabilities and security holes in a network, application, or device before an attacker does. An IT attack can have serious consequences for a company's reputation and business. Pentest can help minimize the risk of an attack and protect the company's reputation.
The price varies according to the company's needs. Minimum 3 days from DKK 50.400,-
For more information check out our license agreement
Book
Book
Measure your company's resilience to hacker attacks with a Cyber Risk Assessment (CRA).
At EAGLE SHARK CYBER DEFENCE, we have developed our own software which is a cyber risk assessment based on one of the world's best framework tools (CMMC), and is the model used by the United States Department of Defense (DoD) to ensure that contractors and subcontractors working with DoD meet their security requirements and maintain a high degree of cyber maturity.
Our software can be used to measure your own business, your suppliers, partners and subcontractors. Thus, our software gives your company an easy and comprehensive overview everyone's IT security level. The use of our software sets the stage for a continuous process where companies must demonstrate that they maintain their security level and follow best practices in cybersecurity.
This gives a "live" picture of the company's IT security level and binds the management and IT department, as well as suppliers and partners together, via a common "language" when the company's IT security level is discussed.
The full version of our software can be accessed automatically via one of our license agreements. Read more under license agreements or click on the "button" below.
The price varies depending on which license agreement you sign up for, and starts from DKK 2,000,-
It includes cyber risk assessment and a incident response team, with 24/7 emergency number.
For more information check out our license agreement
FREE VERSION
LICENSE AGREEMENT
You can test and work with our software (CRA) via a free version, which is a smaller version of the full version.
To access this version, press the "button" below.
Senior specialist in IT security
Senior specialist in IT security with a background from FE, and more than 20 years of experience in offensive IT security
Director
15 years of experience in strategic security, 6 years of experience in cryptocurrency, document and process management in ransomware cases
IT security consultant
5 years of experience in IT and specialty with 1.5 years of education in IT security. With a background in infrastructure
In addition to our internal team, we also have a number of strategic partners both nationally and internationally.
Have you checked out our free version of CRA? Click here!
Strategic Communications Advisor
Crisis communication specialist with more than 20 years of experience in the field
Data hostage negotiator
Data hostage negotiator with more than 20 years of experience and background as a hostage negotiator in PET
IT security consultant
5 years of experience in IT and specialty with 1.5 years of education in IT security. Based on development
OSINT & Redteam specialist
Senior specialist in OSINT and REDTEAM, with more than 20 years of experience from the Armed Forces Special Unit
IT security trainee
2 years of experience in development. Trained as a computer technician specializing in programming
Have you checked out our free version of CRA? Click here!
Senior IT-security consulting
Has 20 years of experience with IT security consulting and maturity assessments.
IT-security consulting
20 years of IT management consultant experience in organizational and agile transformation with a specialty in security, compliance and standards such as ISO2700X, NIST, CIS, CMMI.