GET STARTED

0$

Thank you. A Grid32 cyber-expert will review the quote and contact you to finalize a proposal and answer any questions that you may have. Please check your junk mail folder if a copy of this quote has not been emailed to you.

What do you need tested?

Click the icons below to select which areas you would like tested.

External Network Penetration Test

Internal Network Penetration Test

Wireless Network Penetration Test

Web Application Penetration Test

Phishing & Social Engineering Testing

Please make a selection to continue

NEXT STEP

External Network Penetration Test

How many internet exposed hosts or resources does your external network have, such as websites, servers, VPN gateways, and firewalls?

Small External Network
(Less than 10 live hosts)
We have less than 10 internet exposed hosts/resources.
This is our network size
Medium External Network
(10 - 30 live hosts)
We have between 10 and 30 internet exposed hosts/resources.
This is our network size
Large External Network
(31 - 75 live hosts)
We have between 31 and 75 internet exposed hosts/resources.
This is our network size
Enterprise External Network
(More than 75 live hosts)
We have more than 75 internet exposed hosts/resources.
This is our network size
Please make a selection to continue

NEXT STEP

Internal Network Penetration Test

How many hosts does your internal network have, such as computers and servers?

Small Internal Network
(Less than 75 hosts)
We have less than 75 internal hosts.
This is our network size
Medium Internal Network
(75 - 250 hosts)
We have between 75 and 250 internal hosts.
This is our network size
Large Internal Network
(251 - 1,000 hosts)
We have between 251 and 1,000 internal hosts.
This is our network size
Enterprise Internal Network
(More than 1,000 hosts)
We have more than 1,000 internal hosts.
This is our network size
Please make a selection to continue

NEXT STEP

Wireless Network Penetration Test

Enter the total number of unique wireless networks or SSIDs that you would like tested.


Enter the total number of unique locations that need to be tested. If the same wireless network can be reached at two locations, we can test it from a single location, but if you have unique networks at different locations, we need to run testing at each location.

Please make a selection to continue

NEXT STEP

Web Application Penetration Test

How many estimated dynamic pages does your web application contain?

Small Web Application
(Less than 7 dynamic pages)
Our application has less than 7 dynamic pages.
This is our application size
Medium Web Application
(7 - 12 dynamic pages)
Our application has between 7 and 12 dynamic pages.
This is our application size
Large Web Application
(13 - 20 dynamic pages)
Our application has between 13 and 20 dynamic pages.
This is the size of our app
Enterprise Web Application
(More than 20 dynamic pages)
Our application has more than 20 dynamic pages.
This is the size of our app

Please make a selection to continue

NEXT STEP

Phishing & Social Engineering Assessment

Click the icons below to select which methods of phishing you would like us to attempt

Email Phishing

Phone Phishing

Text Message Phishing

Please make a selection to continue

NEXT STEP

Email Phishing

What is the estimated number of users in-scope for email phishing?

Small Userbase
(Less than 75 users)
There are less than 75 users in-scope for email phishing.
This is my size
Medium Userbase
(75 - 250 users)
There are between 75 and 250 users in-scope for email phishing.
This is my size
Large Userbase
(251 - 1,000 users)
There are between 251 and 1,000 users in-scope for email phishing.
This is my size
Enterprise Userbase
(More than 1,000 users)
There are more than 1,000 users in-scope for email phishing.
This is my size
Please make a selection to continue

NEXT STEP

Phone Phishing

What is the estimated number of users in-scope for phone phishing?

Small Userbase
(Less than 25 users)
There are less than 25 users in-scope for phone phishing.
This is my size
Medium Userbase
(25 - 75 users)
There are between 25 and 75 users in-scope for phone phishing.
This is my size
Large Userbase
(76 - 250 users)
There are between 76 and 250 users in-scope for phone phishing.
This is my size
Enterprise Userbase
(More than 250 users)
There are more than 250 users in-scope for phone phishing.
This is my size
Please make a selection to continue

NEXT STEP

SMS Text Message Phishing

What is the estimated number of users in-scope for SMS text message phishing?

Small Userbase
(Less than 25 users)
There are less than 25 users in-scope for SMS text phishing.
This is my size
Medium Userbase
(25 - 75 users)
There are between 25 and 75 users in-scope for SMS text phishing.
This is my size
Large Userbase
(76 - 250 users)
There are between 76 and 250 users in-scope for SMS phishing.
This is my size
Enterprise Userbase
(More than 250 users)
There are more than 250 users in-scope for SMS text phishing.
This is my size
Please make a selection to continue

NEXT STEP

Final Estimate

The final estimated price is:

Quote Summary

Once submitted, a Grid32 cyber-expert will contact you to review the exercise, determine scheduling, and send a formal Statement of Work for execution.

Description Information Quantity Price
Discount :
Total :

SUBMIT MY QUOTE FOR REVIEW

Get in touch with a cybersecurity expert

We will never share your information or use it for unwanted solicitations.

If you need assistance with your quote, please contact us and we will be glad to assist you.

614 Frelinghuysen Ave | Newark, NJ | 07114

(800) 936-3204