<img alt="" src="https://secure.tray0bury.com/193812.png" style="display:none;">

EAGLE SHARK

CYBER DEFENCE

  • Home
  • Ransomware
  • CRA
  • News
  • Kontakt

EAGLE SHARK CYBER DEFENCE

EAGLE SHARK

CYBER DEFENCE

  • Home
  • Ransomware
  • CRA
  • News
  • Contakt

EAGLE SHARK CYBER DEFENCE

Pentest & Red Team

Beat the Hackers to the Punch!
Get tested with a professional penetration test  

See More

Workshop

Make management and employees mentally and physically prepared for a future IT attack

See More

See More

Preventive services and 24/7 incident response at a fixed low price

License Agreement

See More

Prevent hacker attacks!Get a risk assessment of the company´s enviroment

Cyber Risk Assessment

EAGLE SHARK CYBER DEFENCE

For everyone who cherish the future.

Your strategic partner in crisis and risk mitigation.

This is how our services work

1

2

3

Before an attack

During an attack

After an attack

Measuring a company's resilience against cyber attacks and optimizing the company's IT security.

Having access to specialists with 24/7 availability and experience in IT security, crisis communication, crypto setup, data ransom negotiation, and "best practices" during cyber attacks

Incident report to authorities and IT forensics to find and close the vulnerabilities that the criminals exploited.

2

3

2

3

PREVENTION AND INCIDENT RESPONSE

Gør som mange andre virksomheder, indgå et samarbejde med os.

Vi hjælper jeres virksomhed før, under og efter et angreb.

Alle services og software er samlet i en fast lav månedlig ydelse, som betyder at du kender dine omkostninger

Do as many other companies do, enter into a partnership with us.

We help your company before, during and after an attack.

All services and software are included in a fixed low monthly payment, meaning you know your costs.

Purchase

6 H

4 D

Incident response inside (X) Hour

Online  awareness training

LICENSE AGREEMENT

Our license agreement has three primary services. We measure the company's resilience against potential cyber attacks. We perform optimization of the company's IT security and a 24-7-365 incident response.

Read more about what the License Agreement contains:

Safe and professional negotiation in case of ransomware attacks, risk mitigation in case of ransom payments, transparent communication, communication log for insurance, training and building of crisis teams, strategic crisis communication, regaining trust from the public, press and customer handling, Crypto account, 100% transparency, access to Crypto currency, compliance check, IT security consultants, insurance matters, fast response time, and experience with ransomware.

Cyber risk assessment (SAAS)

24/7 emergency number

Crypto access  (X) M.

Pentest  (X) days/year

Workshop 1 day/year

Support

ESCD certification

pointer triangle

3 D

8 H

16 H

Purchase

9500 dkk/month

2000 dkk/month

5500 dkk/month

CERTIFICATION

CALL

BUSINESS

Spar44%

Spar50%

Spar 59%

Purchase

+10 M

5 M

1 M

Value

20.000 dkk/y

10.000 dkk/y

5.000 dkk/y

from 8.800 dkk/y

from 16.800 dkk/y

from 12.000 dkk/y

55.000 dkk/y

10 H

5 H

from 2.200 dkk/y

16.800 dkk/y

279.400 dkk/year

146.000 dkk/year

Total value

43.800 dkk/year

Hourly price 1.600 dkk

Hourly price 1.900 dkk

Hourly price 2.100 dkk

Cyber risk assessment (SAAS)

24/7 call center

Adgang til Krypto op til (X) M.

Incident response under (X) Timer

Online  awareness træning

Pentest  (X) dage/året

Workshop 1 dag/året

Support

ESCD certificering

Værdi totalt

Cyber risk assessment (SAAS)

24/7 call center

Adgang til Krypto op til (X) M.

Incident response under (X) Timer

Online  awareness træning

Pentest  (X) dage/året

Workshop 1 dag/året

Support

ESCD certificering

Værdi totalt

Cyber risk assessment (SAAS)

24/7 call center

Adgang til Krypto op til (X) M.

Incident response under (X) Timer

Online  awareness træning

Pentest  (X) dage/året

Workshop 1 dag/året

Support

ESCD certificering

All prices are ex. VAT.

All prices are ex. VAT.

All prices are ex. VAT.

The workshop outfits the company's management and crisis team for a possible future attack.

The team will go home with a revised crisis plan based on "best practices" at the operational and strategic level.

The workshop makes management aware of any vulnerabilities in the current crisis readiness.

Do you wish for the workshop to be included in your license agreement?

Please check our license agreement.

You can order a workshop without a license agreement. The price per workshop is DKK 55,000,-

PRICES

WORKSHOP

pointer triangle

LICENSE AGREEMENT

BOOK

BOOK

The best price is obtained by choosing a certified license agreement, where the workshop is included in the price.

Press the button below to read more about the license agreements.

speach bubble pill left

Have you checked out our free version of CRA? Click here!

PRICES

Red Team
A so-called "Red Team" attack is a physical and digital penetration, which is carried out by making use of "ethical hacking skills" and "Social Engineering". The company's employees receive no notice of a "Red Team attack" and must therefore handle this as a real illegal intrusion into the company. The goal is to test the organization's detection and response capabilities. The Red Team will try to gain access to sensitive information in every way imaginable. A "Red Team" team typically consists of several different specialists, all of whom have many years of experience in the field. The team's background is in the armed forces, including the Danish Special Forces, the services and diplomacy.
 

 

 

Pentest

A pen test, also known as a penetration test, is a simulated cyberattack that is carried out by security experts with the aim of finding vulnerabilities and security holes in a network, application, or device before an attacker does. An IT attack can have serious consequences for a company's reputation and business. Pentest can help minimize the risk of an attack and protect the company's reputation.

PENTEST & RED TEAM

The price varies according to the company's needs. Minimum 3 days from DKK 50.400,-

For more information check out our license agreement

 

Book

pointer triangle

Book

Measure your company's resilience to hacker attacks with a Cyber Risk Assessment (CRA).

At EAGLE SHARK CYBER DEFENCE, we have developed our own software which is a cyber risk assessment based on one of the world's best framework tools (CMMC), and is the model used by the United States Department of Defense (DoD) to ensure that contractors and subcontractors working with DoD meet their security requirements and maintain a high degree of cyber maturity.

Our software can be used to measure your own business, your suppliers, partners and subcontractors. Thus, our software gives your company an easy and comprehensive overview everyone's IT security level. The use of our software sets the stage for a continuous process where companies must demonstrate that they maintain their security level and follow best practices in cybersecurity.

This gives a "live" picture of the company's IT security level and binds the management and IT department, as well as suppliers and partners together, via a common "language" when the company's IT security level is discussed.

The full version of our software can be accessed automatically via one of our license agreements. Read more under license agreements or click on the "button" below.

The price varies depending on which license agreement you sign up for, and starts from DKK 2,000,-

It includes cyber risk assessment and a  incident response team, with 24/7 emergency number.

For more information check out our license agreement

 

PRICES

CYBER RISK ASSESSMENT

pointer triangle

FREE VERSION

LICENSE AGREEMENT

You can test and work with our software (CRA) via a free version, which is a smaller version of the full version.

To access this version, press the "button" below.

Senior specialist in IT security

[email protected]

Senior specialist in IT security with a background from FE, and more than 20 years of experience in offensive IT security

MEET THE TEAM BEHIND

EAGLE SHARK CYBER DEFENCE

Christian

Director

[email protected]

15 years of experience in strategic security, 6 years of experience in cryptocurrency, document and process management in ransomware cases

IT security consultant

[email protected]

5 years of experience in IT and specialty with 1.5 years of education in IT security. With a background in infrastructure

Rodolfo

Gerrit

Anna

Kasper

Rasmus

Christian

Lucas

linkedin-color-circle-outline
pointer triangle

In addition to our internal team, we also have a number of strategic partners both nationally and internationally.

STRATEGIC PARTNERS

speach bubble pill left

Have you checked out our free version of CRA? Click here!

Strategic Communications Advisor

[email protected]

Crisis communication specialist with more than 20 years of experience in the field

Data hostage negotiator

[email protected]

Data hostage negotiator with more than 20 years of experience and background as a hostage negotiator in PET

IT security consultant

[email protected]

5 years of experience in IT and specialty with 1.5 years of education in IT security. Based on development

OSINT & Redteam specialist

[email protected]

Senior specialist in OSINT and REDTEAM, with more than 20 years of experience from the Armed Forces Special Unit

IT security trainee

[email protected]

2 years of experience in development. Trained as a computer technician specializing in programming

speach bubble pill left

Have you checked out our free version of CRA? Click here!

Some of our clients: