Kaska Cyber Security
Pre-Breach · Post-Breach · Continuous

Cyber Resilience
Services.

Four continuous service programmes — Assessment, Monitoring, Compliance, and Forensics — delivered by expert practitioners and leading platforms as a single unified engagement.

Service Packages

One programme. Three tiers.

Each tier delivers across all four service disciplines simultaneously — Assessment, Monitoring, Compliance, and Forensics. You choose the depth. We deliver everything.

Silver

Foundation

Essential cyber resilience for growing organisations.

Assessment
  • Vulnerability management — continuous scanning
  • Quarterly penetration test (external + web application)
  • Attack surface discovery (snapshot)
  • Risk-based remediation advisory
Monitoring
  • 24×7 SOC — L1 + L2 analyst coverage
  • SIEM management (up to 15 log sources)
  • Vulnerability intelligence feed (CVE / NVD / EPSS)
  • Monthly threat briefing report
Compliance
  • Single framework implementation (ISO 27001, SOC 2, or PCI-DSS)
  • Policy and control library development
  • VM evidence mapped to framework controls
  • Basic third-party risk management (up to 10 vendors)
Forensics
  • Incident response plan development
  • Forensic readiness assessment
  • Log retention strategy advisory
  • Annual tabletop exercise
★ Most Selected

Gold

Recommended

Comprehensive protection for established enterprises.

Assessment
  • Daily VM scanning with SLA-based remediation tracking
  • Breach & Attack Simulation — quarterly
  • Attack Surface Management — continuous
  • API and mobile application testing (annually)
  • Dedicated assessment analyst
  • Executive exposure dashboard
Monitoring
  • 24×7 SOC — L1, L2, and L3 analyst access
  • SIEM — unlimited log sources + custom detection rules
  • EDR platform management
  • SOAR automated playbook response
  • Threat intelligence feeds + IOC integration
  • Quarterly CISO posture review
Compliance
  • Multi-framework alignment (up to 3 frameworks)
  • Continuous compliance monitoring + automated evidence
  • Internal audit cycles — quarterly
  • TPRM continuous monitoring (up to 25 vendors)
  • Board-ready compliance dashboard
Forensics
  • DFIR retainer — remote response with defined SLA
  • Disk, memory, and network forensics
  • Malware analysis
  • Quarterly tabletop exercise

Platinum

Enterprise

Full-spectrum resilience for high-risk, regulated organisations.

Assessment
  • Continuous Automated Red Team (CART)
  • CTEM — full programme lifecycle
  • Social engineering simulation — quarterly
  • OT / ICS security assessment
  • Zero-day threat hunting
  • SLA-backed remediation validation
Monitoring
  • Named dedicated threat hunter
  • UEBA + Network Detection & Response
  • Dark web and adversary actor tracking
  • On-site incident response capability
  • Real-time executive security dashboard
  • Monthly CISO advisory sessions
Compliance
  • Unlimited framework coverage
  • Full GRC platform management
  • Privacy compliance — GDPR, DPDPA, CCPA
  • Named dedicated GRC lead
  • Board and regulatory presentations
  • Regulatory liaison and external audit support
Forensics
  • Named DFIR lead + on-site response
  • Mobile and cloud forensics
  • Reverse engineering and threat attribution
  • E-discovery and court-ready reporting

All packages are tailored engagements. Scope, duration, and pricing discussed during a no-obligation discovery call.

Technology Partners

Best-in-class platforms. Expert-led delivery.

We operate whichever platform is already in your environment — or recommend the right fit. You are never locked into a single vendor.

Vulnerability & Assessment
TenableQualysRapid7SafeBreachAttackIQXM CyberPenteraCensysPicus Security
Security Operations (SOC / SIEM)
Google SecOpsMicrosoft SentinelSplunkIBM QRadarCrowdStrike FalconSentinelOne
Detection & Response
Palo Alto XSOARSplunk SOARRecorded FutureMandiantDarktraceVectra AIExabeam
GRC & Compliance
RSA ArcherServiceNow GRCIBM OpenPagesVantaDrataOneTrustBigID
Forensics & Incident Response
Magnet AXIOMOpenText EnCaseCellebriteCrowdStrike ServicesPalo Alto Unit 42
The Kaska Model

Expert practitioners.
Leading platforms.
Continuous delivery.

Most managed security services separate technology from expertise — you get the platform or you get the consultant. Kaska delivers both as a single continuous engagement, so your posture improves every month, not just after an annual assessment.

Start the Conversation
Platform-Agnostic
We operate your existing stack or recommend the right fit — no vendor lock-in.
Pre & Post-Breach
Continuous coverage across the full attack lifecycle, not just one phase.
Named Practitioners
Dedicated analysts and consultants — not anonymous offshore teams.
Outcome-Driven
Deliverables and SLAs defined upfront — you know exactly what you get.

Ready to build
lasting resilience?

Tell us where you are. We'll scope the right programme and respond within 24 hours.