GOVERN - IDENTIFY - PROTECT - DETECT - RESPOND - RECOVER
INFOADVISOR™ Info Risk Analysis & Detection
Buy NowPersonal Info Risk Assessment:
Start with an Analysis, Risk Score, Report Free: Personal Info Risk Score
Business Info Risk Analysis & Detection:
Helping organizations protect against serious cyberthreats such as ransomware.
- Cloud Data Protection ✔
- Dark Web Monitoring ✔
- Cloud Directory Monitoring ✔
- Email Protection ✔
- Secure Browsing ✔
- Awareness Training ✔
- Phishing Simulations ✔
- Cyber Insurance Quote ✔
- $154 per User/Month Value
Only $49 per User/Month
Add End Point Security - endpoint detection and response (EDR) for only $30 per PC/Server per Month.
INFOADVISOR™ Information Governance Workshop
Contact UsUnsure of the information risks inside your company?
Conduct a Business Workshop to prioritize remediation and also earn Continuing Education (CE/CPE/CLE) credits
INFOADVISOR™ Discovery
Contact UsNeed assistance with a new or existing project?
Let us optimize your processes with an Initial Data & Technology Insights Engagement
INFOCLAVE™ Secure Enclave as a Service
Book a DemoNeed to protect sensitive data workflows immediately?
Leverage our All-in-one Information Protection Platforms for Users. Sensitive Information: Discovery, Implementation, Configuration, & Reporting
INFOADVISOR™ VIP Advisory Services
Schedule a CallHire an individual or team of experts for more complex projects and programs.
Choose our bespoke Advisory Services: Consulting, Training, Coaching, Remediation & Implementation
SERVICE COMPARISON CHART
Solutions & Services: | Info Risk Analysis & Detection | Information Governance Workshop | InfoAdvisor™ Discovery | InfoClave™ Secure Enclave as a Service | VIP Advisory Services |
---|---|---|---|---|---|
Description | Don't know your information risk profile? Start with a Risk Score, Report, & Cyber Insurance Quote | Unsure of the information risks inside your company? Conduct a Business Workshop to prioritize remediation and also earn Continuing Education (CE/CPE/CLE) credits | Need assistance with a new or existing project? Let us optimize your processes with an Initial Data & Technology Insights Engagement | Need to protect sensitive data workflows immediately? Leverage our All-in-one Information Protection Platforms for Users. Sensitive Information: Discovery, Implementation, Configuration, & Reporting | To hire an individual or team of experts for more complex projects and programs, choose our Custom Advisory Services: Consulting, Training, Coaching, Remediation & Implementation |
Client Participants | ✔ Up to 2 Attendees | ✔ Up to 8 Attendees | ✔ Up to 10 Interviews | ✔ 10+ Client Users | ✔ Custom |
Audience | ✔ Business Owners, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk, Entrepreneurs, Solopreneurs | ✔ C-Suite, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk | ✔ C-Suite, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk | ✔Entrepreneurs, Solopreneurs, Sensitive Data Business & Consumer Users, HR, Legal, Compliance, Records/Data, IT, Security, Risk | ✔ High Net Worth Consumers, Government Officials, Influencers, C-Suite, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk |
Deliverables | ✔ Free Internet Risk Score & Cyber Insurance Quote ✔ Paid Report High Level Risk Remediation Plan ✔ Cloud Data Protection ✔ Dark Web Monitoring ✔ Cloud Directory Monitoring ✔ Email Protection ✔ End Point Security ✔ Secure Browsing ✔ Security Awareness Training ✔ Phishing Simulations | ✔ Roadmap ✔ Worksheets & Certificates ✔ Internet Risk Score ✔ Paid\ Report High Level Risk Remediation Plan | ✔ Detailed Analysis ✔ Detailed Risk Remediation Roadmap ✔ Playbooks | ✔ Detailed Analysis ✔ Detailed Risk Remediation Roadmap ✔ Project Plan ✔ Features: VPN, SSO, Encryption, Data Loss Prevention, Compliance Monitoring & Reporting | ✔ Detailed Analysis ✔ Detailed Risk Remediation Roadmap ✔ Multi-Tiered Project Plans, KPI/KRI Reports, Workshops, Vendor Management, & More |
Advisors | 1-2 | 2-3 | 1-2 | 1-3+ | 3+ |
Tech Consultants | 0 | 0 | 2-3 | 2-3 | 3+ |
People Analysis | - | Yes | Yes | Yes | Yes |
Process Analysis | - | Yes | Yes | Yes | Yes |
Technology Analysis | Yes | - | Yes | Yes | Yes |
Technology Execution | Yes | - | - | Yes | Yes |
Software Licensing | - | - | - | Yes | Yes |
Contract | - | - | Yes | Yes | Yes |
Business | ✅ | ✅ | ✅ | ✅ | ✅ |
IT | ✅ | ✅ | ✅ | ✅ | ✅ |
Security | ✅ | ✅ | ✅ | ✅ | ✅ |
Privacy | ✅ | ✅ | ✅ | ✅ | ✅ |
Risk | ✅ | ✅ | ✅ | ✅ | ✅ |
Legal | ✅ | ✅ | ✅ | ✅ | ✅ |
Records/Data | ✅ | ✅ | ✅ | ✅ | ✅ |
GOVERN | ✅ | ✅ | ✅ | ✅ | ✅ |
IDENTIFY | ✅ | ✅ | ✅ | ✅ | ✅ |
PROTECT | ✅ | ✅ | ✅ | ✅ | ✅ |
DETECT | ✅ | ✅ | ✅ | ✅ | ✅ |
RESPOND | - | - | - | ✅ | ✅ |
RECOVER | - | - | - | - | ✅ |
Timeframe | 24 Hours | 3 Days | 3 Weeks (Min.) | 1-3 Weeks (Min.) | 3-6 Months (Min.). |
Pricing | $$/User/Mo | $,$$$ | $$,$$$ | $$,$$$+ /yr | $$$,$$$+ |