⚙️ Cybergence — We plan, implement, deliver

Project-Based Cybersecurity
for SMBs

Specific security needs, custom scoped. From risk assessments to penetration testing and compliance advisory — choose the exact services your business requires.

✓ Custom scoped — you pay for exactly what you need ✓ Clear proposal within 48 hours of your scoping call ✓ Delivered by senior security engineers
💡 For an all-encompassing solution, explore our Managed Cybersecurity plans — starting at €499/month.
✓ PENTEST ✓ AUDIT → REMEDIATE ENGAGEMENT IN PROGRESS

Pick what your business needs.

All projects are custom-scoped and priced. Book a scoping call to get a clear proposal within 48 hours.

🔍

Cybersecurity Posture Audit & Risk Assessment

A deep dive into your current security stance — endpoints, email, identity, network perimeter, physical access, and policies. You receive a prioritized risk map and remediation roadmap. Starting point for most projects.

Custom Price
🔓

Vulnerability Testing & Penetration Testing

Proactively identify what attackers would find before they find it. We conduct structured vulnerability scanning and manual penetration testing, then provide a prioritized remediation plan.

Custom Price
🛡️

Data Security & Protection

Smart data storage design, data loss prevention, governance frameworks, and GDPR-aligned best practices. Critical for businesses handling sensitive client or financial data.

Custom Price
📋

Employee Security Policy

A robust, enforceable security policy tailored to your business operations. Covers acceptable use, device policy, password requirements, incident reporting, and more.

Custom Price
🎓

Employee Training & Awareness Program

Comprehensive training package including interactive sessions and a customised security guide. Builds your team's ability to identify and stop threats before they become incidents.

Custom Price
💻

Endpoint Monitoring & Protection

Deploy and configure advanced monitoring on employee devices to detect and block malware, ransomware, and lateral movement. Critical for SMBs without in-house IT.

Custom Price
🔄

Incident Recovery & Business Continuity Plan

A documented, tested incident recovery playbook designed around your actual systems. Minimise downtime and decision paralysis when an incident occurs.

Custom Price
⚖️

Compliance Regulations Advisory

Practical support aligning your operations with GDPR, NIS2, ISO 27001, and sector-specific requirements. We translate regulatory language into actionable security controls.

Custom Price
⚙️

Custom Security Solution Development

Your environment is unique. We design and build tailored security solutions for specific infrastructure challenges — automation, integration, detection logic, and more. No off-the-shelf template.

Custom Price

Questions we get asked before the first call.

How do I know which project I actually need?
That's exactly what the free scoping call is for. Most clients come in knowing something feels off — or knowing a specific event is coming (audit, expansion, compliance deadline). We listen, ask the right questions, and recommend the most impactful starting point. You leave with a clear picture even if you decide not to proceed.
How quickly can you deliver a proposal after the scoping call?
Within 48 hours. The proposal includes a clear scope, deliverables, timeline, and fixed price — no vague estimates or open-ended billing.
Are these one-off engagements or do they lead to ongoing work?
Entirely your choice. Project-based work is fully standalone — you get a deliverable and that's it. Many clients use a project as a starting point and later move to a managed plan, but there's no obligation or upsell pressure built into the process.
What does a penetration test actually involve?
We simulate how a real attacker would approach your environment — testing your external perimeter, internal systems, web applications, or all of the above depending on scope. You receive a prioritised report with every finding explained in plain language, and a clear remediation roadmap.
How disruptive are these projects to our day-to-day operations?
Minimal. We coordinate around your schedule and work primarily in the background. Penetration tests can be timed for low-traffic periods if needed. Most projects require only a few hours of your team's time for kickoff and review sessions.
Do you provide support after the project is delivered?
Yes. Every project includes a post-delivery review call where we walk through findings and answer questions. If remediation support is needed beyond the initial scope, we can price that as a follow-on engagement.
Can you help with GDPR or NIS2 compliance specifically?
Yes — our Compliance Regulations Advisory service covers exactly this. We translate the regulatory language into specific, actionable security controls for your environment. We don't give legal advice, but we bridge the gap between the regulation and what needs to technically happen in your systems.

Not sure what you need?

Start with a free scoping call. We'll identify your highest-risk exposures and recommend the right starting point — whether that's a one-off project or a managed plan.