icon
  • Automated API vulnerability scanning
icon
  • Runtime protection and behavior analysis
icon
  • OWASP Top 10 for APIs compliance
icon
  • Continuous API security testing for DevSecOps
icon
  • External and internal network assessments
icon
  • Application and infrastructure penetration testing
icon
  • Cloud security assessments (AWS, Azure, GCP)
icon
  • Enterprise Key Management Systems (KMS)
icon
  • Hardware Security Modules (HSMs)
icon
  • Data-at-rest and data-in-transit encryption
icon
  • PKI and digital certificate lifecycle management

License Pricing(Annual Subscription)

S.No. Description Minimum Order Size Unit Price(INR)
1 DPM easy2Go Enterprise license 100 53,600
2 DPM easyCipher Laptop Agent license 100 62,000
3 DPM easyCipher Server Agent license per instance 2 2,760,000
4 DPM easyCipher Server Agent test license 1 1,380,000
5 DPM easyKey Manager Lite license per instance for 1 Client, upto 3 HSM (same vendor), Key Generation Policy 1 5,120,000
6 DPM easyKey license upgrade to support Certificate Manager with 500 Certificates 1 5,360,000
7 DPM easyKey Manager Lite license per instance for 3 Client, 1 HSM interface, Key Generation Policy and for management of up to 1,000 keys 1 6,000,000
8 DPM easyCipher Manager Standard License per instance to manage up to 10 Agents for Windows and Linux based servers (App, DB, Web, File, NAS) 1 4,600,000
For additional configurations, please send us an email

CYBER RANGES delivers World-Class Cybersecurity Training and Capability Development Exercises using Next-Generation Technology and Services for the Design, Delivery and Management of Simulation-Based, Deep-Dive Experiences in Cybersecurity.

Key Industry Facts on Cybersecurity:

DATOS INSIGHTS

Cyber ranges improve first responder effectiveness: cyber range training improves memory retention by 75%, compared to 5% through traditional learning methods.

European Systemic Risk Board

The European Systemic Risk Board (ESRB) estimates the global cost of cyber attacks for the financial sector to be worth $45bn to $654bn.

ISACA

Cybersecurity professionals consider hands-on experience (97%), credentials (88%), and completion of hands-on training courses (83%) as key factors in qualifying candidates.

Team collaboration in a simple way

AI-driven chatbot in the past allowing you to focus more on your business or simply.

Projects and task management

AI-driven chatbot in the past allowing you to focus more on your business or simply.

Centralize your workflows

AI-driven chatbot in the past allowing you to focus more on your business or simply.

Pricing:
CYBER RANGES ON PREMISE Barebone Platform – 424

20 Users Pack

₹1,13,00,000

  • ✔ Apache ActiveMQ 5.14.0 Remote Code Execution
  • ✔ Apache Solr 7.1 XML Entity Injection Vulnerability
  • ✔ Nginx 0.5.6 to 1.13.2 7.1 integer overflow Vulnerability
  • ✔ GhostScript Sandbox Bypass (Command Execution)
  • ✔ Apache Solr 8.2.0 Remote Code Execution Vulnerability
  • ✔ sudo <=1.8.28 Security bypass vulnerability
  • ✔ Webmin <=1.920 Webmin Command Injection Vulnerability
  • ✔ Girolamo
  • ✔ Gelix
  • ✔ IFI
  • ✔ Xanthos
  • ✔ Alphius
  • For additional Labs, please send us an email
  • 50 Users Pack

    ₹27,120,000

    • ✔ Apache ActiveMQ 5.14.0 Remote Code Execution
    • ✔ Apache Solr 7.1 XML Entity Injection Vulnerability
    • ✔ Nginx 0.5.6 to 1.13.2 7.1 integer overflow Vulnerability
    • ✔ GhostScript Sandbox Bypass (Command Execution)
    • ✔ Apache Solr 8.2.0 Remote Code Execution Vulnerability
    • ✔ sudo <=1.8.28 Security bypass vulnerability
    • ✔ Webmin <=1.920 Webmin Command Injection Vulnerability
    • ✔ Girolamo
    • ✔ Gelix
    • ✔ IFI
    • ✔ Xanthos
    • ✔ Alphius
  • For additional Labs, please send us an email
  • 100 Users Pack

    ₹5,19,80,000

    • ✔ Apache ActiveMQ 5.14.0 Remote Code Execution
    • ✔ Apache Solr 7.1 XML Entity Injection Vulnerability
    • ✔ Nginx 0.5.6 to 1.13.2 7.1 integer overflow Vulnerability
    • ✔ GhostScript Sandbox Bypass (Command Execution)
    • ✔ Apache Solr 8.2.0 Remote Code Execution Vulnerability
    • ✔ sudo <=1.8.28 Security bypass vulnerability
    • ✔ Webmin <=1.920 Webmin Command Injection Vulnerability
    • ✔ Girolamo
    • ✔ Gelix
    • ✔ IFI
    • ✔ Xanthos
    • ✔ Alphius
  • For additional Labs, please send us an email
  • 200 Users Pack

    ₹8,08,00,000

    • ✔ Apache ActiveMQ 5.14.0 Remote Code Execution
    • ✔ Apache Solr 7.1 XML Entity Injection Vulnerability
    • ✔ Nginx 0.5.6 to 1.13.2 7.1 integer overflow Vulnerability
    • ✔ GhostScript Sandbox Bypass (Command Execution)
    • ✔ Apache Solr 8.2.0 Remote Code Execution Vulnerability
    • ✔ sudo <=1.8.28 Security bypass vulnerability
    • ✔ Webmin <=1.920 Webmin Command Injection Vulnerability
    • ✔ Girolamo
    • ✔ Gelix
    • ✔ IFI
    • ✔ Xanthos
    • ✔ Alphius
  • For additional Labs, please send us an email
  • OpenText™ Static Application Security Testing (Fortify) (SAST) identifies and remediates security vulnerabilities in source code with precision. Extensive language coverage and seamless CI/CD integration streamline security across the SDLC. Advanced static code analysis and AI-driven insights prioritize risks and enable developers to resolve vulnerabilities efficiently, reducing overall security risk.


    Key feature:

    Developer-friendly language coverages

    Supports ABAP/BSP, ActionScript, Apex, ASP.NET, C# (.NET), C/C++, Classic, ASP (with VBScript), COBOL, ColdFusion CFML, Go, HTML, Java (including Android), JavaScript /AJAX, JSP, Kotlin, and more.

    Flexible deployment options

    Includes options such as the SaaS-based OpenText™ Core Application Security Testing platform, private hosted, which combines SaaS and on-premises features, and off-cloud, which offers full control over the application security testing solution.

    Real-time code security analysis and results

    Provides structural and configuration analyzers that are purpose built for speed and efficiency. Security Assistant only returns high-confidence findings with immediate results in the IDE.

    Automation with applied machine learning

    Provides automated audit results in minutes, minimizing auditor workload and prioritizing issues with accurate and consistent audit results.

    ScanCentral

    Enables lightweight packaging on the build server and provides a scalable, centralized scanning infrastructure.

    Continuous improvement insights

    Leverages data analytics to suggest improvements and optimize workflows.

    License Pricing(Annual Subscription)

    S.No. Developers Unit Price(INR)
    1 5 Developers (Minimum) 35,75,000
    2 10 Developers 33,15,000
    3 20 Developers 31,00,000
    4 50 Developers 26,50,000
    5 100 Developers 24,10,000
    For additional configurations, please send us an email

    Onward Security, a DEKRA company, provides IoT cybersecurity compliance solutions. It has been selected as a Hot Company in the Cybersecurity Internet of Things, Global InfoSec Awards. In addition to possessing Asia's most complete cybersecurity assessment lab, it develops security assessment automation tools. It has been dedicated to helping customers in IoT/IIoT device manufacturing, automotive, medical, and other industries to quickly obtain security certification and effectively manage risks and vulnerabilities of software to ensure cyber and product security.

    Onward Security Pricing

    S.No. Description subscription license. Unit Price(INR)
    1 HERCULES SecDevice, IPCAM Fuzzer Package, 1 year subscription license (VM Software) 1 year subscription license. HTTP Fuzz Testing TLSv1.2 Server Fuzz Testing UPnP Fuzz Testing RTSP Fuzz Testing RTCP Fuzz Testing RTP Fuzz Testing Wi-Fi Wireless LAN 802.11 Client Fuzz Testing 1,20,00,000
    2 HERCULES SecDevice, Vulnerability Assessment Package, 1 year subscription license (VM Software) (Ask upon request) 1 year subscription license. (Ask upon request) 40,00,000
    3 HERCULES SecDevice, Web Application Scan Package, 1 year subscription license (VM Software) 1 year subscription license. HTTP, WEB Fuzz (including XML and JSON format) 40,00,000
    4 HERCULES SecDevice, Network Devices Fuzzer Package, 1 year subscription license (VM Software) 1 year subscription license. IPv6 TCP fuzz IPv6 ICMP fuzz TLS v1.2 DHCP v4 DHCP v6 SSH 1,20,00,000

    Orchestra Group products solve the most pressing security concerns for businesses, non-profits and governments. Harmony Purple automates a proven, proactive framework for continuous threat exposure management. Harmony IoT secures the wireless airspace from external and internal threats.

    Products:

    Harmony Purple

    Security experts and the analyst community agree – traditional security management programs are failing to protect organizations from cyber threats. This is especially true for small and medium enterprises (SMEs). SMEs are attacked more frequently than large enterprises yet must defend themselves with fewer resources.

    Harmony IoT

    In today’s smart-connected world, Harmony IoT delivers an enterprise-grade defense for your airspace that protects you from IoT and wireless-borne attacks.

    Harmon IOT Pricing

    S.No. Description Quantity Unit Price(INR)
    1 Harmony IoT Portable Kit - yearly License* ( Harmony IoT Smart Protectors and software) Upto 5 22,00,000
    2 Hardware Support and spare parts 6 to 10 19,00,000
    3 MSU (Maintenance support and upgrades) Support Plan – Gold (20% of annual subscription fee) 11 to 20 16,00,000
    For More Then 20+ Quantity, please send us an email

    Harmony Purple Pricing

    S.No. Number of IPs Min Order Unit Price(INR)
    1 Upto 500 100 2,070
    2 Hardware Support and spare parts 6 to 10 19,00,000
    3 501-1000 500 1,863
    4 1001-5000 1000 1,656
    5 5,001 - 10,000 5000 7
    6 10,001 - 20,000 1000 1,500
    7 > 20,001(enterprise) 20000 1,350

    Software composition analysis solution for safe operations with open source, license compatibility check, sensitive information identification and code quality assessment.

    Solutions That Work:

    Open Source code inventory

    Analyzing code composition, automatically finding package manager configuration files, identifying direct and transitive dependencies from open source software, generating the Software Bill of Materials.

    Supply chain protection

    Protecting against malicious components, including compromised packages, and offering policies to prevent attacks on the software supply chain. Integrating with Nexus Repository Manager and JFrog Artifactory Pro.

    Vulnerabilities in open source

    Protecting against malicious components, including compromised packages, and offering policies to prevent attacks on the software supply chain. Integrating with Nexus Repository Manager and JFrog Artifactory Pro.

    License compatibility

    Determining licenses of detected open source components. Checking their compatibility with each other. Monitoring compliance with the organization's licensing policies.

    License Pricing(Annual Subscription)

    S.No. Profiscope Project Pricing Unit Price(INR)
    1 Professional Edition (Visibility, Policy, Security, and Compliance Modules)(1 or 5 Projects) 6,00,000
    2 6-10 Projects 5,25,000
    3 11-20 Projects 4,00,000
    4 21-50 projects 2,25,000
    5 51-100 projects 1,10,000
    6 101 -500 (Enteprise) 2,00,00,000
    For additional configurations, please send us an email

    Quickly find and fix the vulnerabilities that put your applications and APIs at risk of attack. Enjoy more peace of mind – without investing more of your limited time. Thousands of businesses automate application security with Acunetix.

    Pricing:

    Flexible Packages, Transparent Pricing

    No FQDN restrictions. Unlimited coverage. Pay for security, not arbitrary limits.

    Essentials

    The foundation for a strong AppSec program—begin with certainty.

    • ✔ Invicti DAST
    • ✔ Internal App Scanning (Agents)
    • ✔ Integrations — Ticketing
    • ✔ Integrations — CI/CD
    • ✔ Predictive Risk Scoring
    • ✔ Runtime SCA
    • ✔ AST Connectors — SAST only
    • ✔ Standard RBAC
    • ✔ Standard Support

    Recommended Add-Ons:

    • ✔ Mend SAST
    • ✔ API Security
    • ✔ Professional Service Hours
    • ✔ Premium Support
    • ✔ U.S.-Based Support

    Professional

    • ✔ Invicti DAST
    • ✔ Internal App Scanning (Agents)
    • ✔ Integrations — Ticketing
    • ✔ Integrations — CI/CD
    • ✔ Predictive Risk Scoring
    • ✔ Runtime SCA
    • ✔ Advanced AST Connectors
    • ✔ Standard RBAC
    • ✔ Standard Support
    • ✔ SSO

    Recommended Add-Ons:

    • ✔ Mend SAST, SCA, and Container Security
    • ✔ API Security
    • ✔ IAST
    • ✔ Professional Service Hours
    • ✔ Premium Support + Guided Success
    • ✔ U.S.-Based Support

    Ultimate

    Comprehensive AppSec for enterprises—maximum security and control.

    • ✔ Invicti DAST
    • ✔ Internal App Scanning (Agents)
    • ✔ Integrations — Ticketing
    • ✔ Integrations — CI/CD
    • ✔ Predictive Risk Scoring
    • ✔ Runtime SCA
    • ✔ Advanced AST Connectors
    • ✔ Customizable RBAC
    • ✔ Premium Support + Guided Success
    • ✔ SSO
    • ✔ API Security
    • ✔ IAST
    • ✔ Audit Log

    Recommended Add-Ons:

    • ✔ Mend SAST, SCA, and Container Security
    • ✔ Dedicated Instance
    • ✔ Advanced Guided Success
    • ✔ Professional Service Hours
    • ✔ U.S.-Based Support