+31 (0) 481 377 265 secure@forus-p.com

Service Packages

You want to offer your customers optimal IT Security. That’s possible with our specially composed service packages. Besides the trusted security sans and suggestions to resolve any vulnerabilities, we can also perform a pentest. We will use our advanced scanners together with a thorough manual check. And if any ‘high risk’ issue arises, we will immediately have a crisis team help minimize damage.


We have developed several service packages, from a basic package to an extensive package. Of course you can choose which fits best for your company. You can look at our service packages as a type of insurance that offers direct support in case of a data leak or serious IT Security incident.

Even though these are complete packages, we also offer the possibility to choose elements from these packages. That means we can offer individual parts as a custom service as well.



  • On site execution
  • Identifying internal and external network connections
  • Check anti-virus/anti-malware
  • Check for unknown and outdated software
  • Check current policies and procedures
  • Check for modern internet standards


  • Monthly Web Application Scans
  • Maximum of 5 domains
  • Including any subdomains
  • Malware checks on websites
  • Secured report with results and recommendations
  • Technical support for questions

security analyst

  • Answering questions
  • Spar about security strategy
  • Consult about security awareness
  • Assist at meetings
  • Check updates
  • Examine pentest results / responsible disclosure (third parties)
  • Translate from IT to business
  • Explain to Management/Board of Directors


  • Assess what is missing or was accessible (for example wrongly sent emails, leaked computer files, stolen customer lists, stolen laptops, lost USB sticks)
  • On site if necessary
  • Communicate with legal department
  • Create documents for data leak reporting
  • Check current data leak procedure
  • Explain to Management/Board of Directors


  • CERT = Computer Emergency Response Team
  • 24/7 reachability for major IT incidents
  • Immediate phone advice
  • On site if necessary
  • Secure data/best effort fix
  • Research after incident
  • Full reporting
  • Explain to Management/Board of Directors


  • Assessment
  • Automated Web Application Scans
  • Automated network scans
  • Extensive manual test
  • Check design, configuration and programming errors
  • Attention for OWASP Top 10 errors
  • Report with findings and recommendations

Our work method

Dedicated contact person

A dedicated contact person will be assigned to you that will perform an assessment on site for you. That person will be available to you for questions, advice, second opinion or as a sounding board for IT Security in your organization. Depending on your request we have a maximum response time of 72 hours during business days.

Support for data leaks

We will support you while researching the size and impact of a data leak. On site if necessary. While handling this we will also look at your data leak procedures to prevent a new leak. Communicating with a legal department and/or management is included.

24/7 reachable with serious IT-incidents

In case of a major IT incident a Computer Emergency Response Team (CERT) is standing by 24/7. Besides an initial advice over the phone, a specialist can come to your location immediately for further research Our goal is damage control and quickly restore your services.

Our Prices

Curious about our services?

Would you like to know more about our service packages or one of our other services? Fill out your details and we will contact you within 24 hours on business days.

We will only use your personal information for the intended purpose. Please read our privacy policy for more information.

* Required

Aanvraagformulier Diensten

14 + 12 =

Security nieuws inuw inbox!

Blijf op de hoogte van het laatste nieuws op het gebied van IT-security en ontvang één keer in de maand onze service bulletin.

You have Successfully Subscribed!