Cyber Cache

Secure Today

Safe Tomorrow

Join the ranks of leading brands that trust Cyber Cache to secure their future

  • Web App
  • Mobile App
  • Cloud Security

SCANNER

$ 1999 Year
  • Unlimited vulnerability scans with 9300+ tests (OWASP, SANS etc.)
  • Unlimited integrations with CI/CD tools, Slack, Jira & more
  • Four expert vetted scan results to ensure zero false positives
  • AI-powered conversational vulnerability fixing assistance

Pentest

$ 5999 Year
  • Unlimited vulnerability scans with 9300+ tests (OWASP, SANS etc.)
  • One pentest (VAPT) per year by security experts
  • Cloud security review for platforms like AWS/GCP/Azure
  • Compliance reporting for SOC2, ISO27001, PCI-DSS, HIPAA etc.
  • Business-logic security testing
  • Publicly verifiable pentest certificate
  • Contextual expert consultation via comments section
  • Everything in the Scanner plan

ENTERPRISE

$ 9999 Year
  • Multiple targets across different asset types
  • Customer Success Manager (CSM) for your organisation
  • Support via Slack Connect or MS Teams
  • Custom SLA/Contracts as per requirement
  • Multiple payment options
  • 3 months rescan period
  • Everything in the Pentest plan

Pentest

$ 2499 Year
  • One vulnerability assessment & penetration test (VAPT) per year by security experts
  • 250+ test cases based on OWASP Mobile Top 10 standards
  • Business-logic testing to uncover logical vulnerabilities
  • Publicly verifiable pentest certificates which you can share with your users
  • Contextual expert support via comments to answer your questions

ENTERPRISE

$ 3999 Year
  • Everything in the Pentest plan
  • Multiple targets across assets types
  • Customer Success Manager (CSM)
  • Custom SLA/Contracts
  • Support via Slack Connect or MS Teams
  • Multiple payment options

basic

Speak to Sales ?
  • 180+ security tests
  • IAM config review
  • Network, logging & monitoring checks
  • AWS organizations review
  • AWS security groups review
  • AWS services review (Compute, Database, Network & Storage)
  • One re-scan to ensure everything is fixed

ELITE

Speak to Sales ?
  • Everything in the Basic plan
  • Five team members for easy collaboration
  • Two re-scans to ensure everything is fixed
  • Publicly verifiable pentest certificates which you can share with your users
  • Contextual expert support via comments to answer your questions

Need additional pentests?

Get in touch to purchase additional pentests or get a tailored quote to your needs and frequency of pentest required.

Looking for an enterprise plan?

Our in-house security experts hold certifications like OSCP, CEH, eJPT, eWPTXv2, CCSP & AWS. Have 20+ CVEs & actively contribute to open source initiatives like OWASP.

Build a strong security posture in 6 simple steps.

Sign-up in 2 mins

Sign up for a Pentest from the website or make a purchase from the Cyber Cache Dashboard.

Map out Scope

Map out the Pentest scope and add the essential scan requirements such as login details, technology etc.

Start a Scan

Start an automated or manual scan whenever you want. See vulnerabilities being reported in minutes.

Fix issues with developers

We'll report vulnerabilities with a risk rating in your dashboard. Collaborate with your developer in fixing them.

We'll do a re-scan

After the vulnerabilities are fixed, we'll do a re-scan to ensure everything is 100% secure.

Get your certificate of security

Get a security certification from Cyber Cache to build trust with your customers and partners!

Frequently Asked Questions

Vulnerability Assessment identifies and lists all existing vulnerabilities in your website. On the other hand, Penetration Testing focuses more on how each of these vulnerabilities could be exploited.

For example, consider a thief trying to enter your house to rob you and you want to take security pre-measures so that the thief won’t be able to enter your house.

Here, vulnerability assessment (VA) is similar to making sure you have all your house windows and doors closed. And penetration testing (PT) is similar to checking the strength or any weaknesses of your windows or doors so that even if a thief tries to enter he won’t find any entry points to enter into your house and you can have a worriless sleep.

Yes, a Pentest is an in-depth exercise that requires hours of effort of human & technology resources. That’s why an upfront payment is expected.

Definitely, once you’ve fixed the vulnerabilities you can request a scan simply by clicking a button on your dashboard. Following which, our engineers are notified and they plan a re-scan. If you are a business plan customer, you get a re-scan every month. If you’ve opted for a security audit separately then one re-scan is available to you.

Yes, for sure. We assist your developers in fixing the vulnerabilities reported. Your developer can comment under each vulnerability if they have any questions regarding the fixation process.

A target is a URL that will be tested by our vulnerability scanner. It can be the URL of a web application, website, API etc.

If your website makes API calls to different domains (eg: api.example.com), you can add them as an extra host without having to purchase another domain. Our scanner scans all the dependencies of such sub-domains on main app at www.example.com.

Let’s say you have a customer dashboard at https://app.example.com/ and an admin dashboard at https://admin.example.com/ with different login pages, then you will need 2 targets. Know More.

– Identify and fix security flaws in your website.

– It gives you a holistic view of misconfigured integrations – -implemented within a site.

– Penetration testing emulates real-life attack scenarios and helps in mitigating risks.

– It can help you in achieving certain compliance requirements such as GDPR, ISO 27001, PCI-DSS, HIPAA and more.

– It enables you to uncover potential vulnerabilities in your site.

– It can save you from legal consequences and hefty penalties under data security policies.

– It helps in preparing your security team to cope up with a real-life cyber attack

You start seeing vulnerabilities reported by us from the day testing is started. You can ask for support in fixing the vulnerabilities for 30-days, starting from the day our engineers finish testing. During these 30 days, our engineers will be available to work with you or your developers and assist them in fixing bugs via the comment system of our dashboard. At any point, if the engineers feel that there is a need for a chat, they’ll be happy to talk to you over a chat too.

Not at all, the security audit and VAPT are agnostic of the technology stack and work well on all websites.

The main role of a VAPT service provider is to reveal all the underlying security vulnerabilities in your website. Always check for:

– #Number of Tests

– VAPT methodology

– Depth of Penetration testing Report

– Video POCs

– Qualification of security engineers

– Certifications