Tier 2: BARE COMPLIANT
The Standard of Care: Proactive Security and Due Diligence
Our recommended security baseline—the Standard of Care for any serious SMB. This tier builds directly on the robust defense of BARE PROTECTED by adding proactive threat hunting, evidence generation, and reporting. It moves you beyond basic protection into verifiable due diligence.
What You Get: Building on Protection
Includes all features from BARE PROTECTED: Managed EDR, M365 Identity Monitoring, and Security Awareness Training.
Vulnerability Scanning
Regular, automated scanning of your internal and external networks to identify unpatched software and configuration weaknesses.
Close Security Gaps. Identifies vulnerabilities before attackers can exploit them, ensuring your infrastructure is hardened and current.
Compliance Reporting
Monthly or Quarterly reports summarizing your security posture, remediation actions, and compliance evidence.
Prove Your Due Diligence. Generates the necessary documentation to demonstrate to partners, insurers, and regulators that you meet the standard of care.
Dark Web Monitoring
Continuous monitoring of known dark web forums and data dumps for compromised company credentials, emails, and sensitive data.
Early Warning System. Alerts you immediately if your employees' credentials are found online, allowing for proactive password changes to prevent breaches.
Priority IR Status
Accelerated response status in the event of a security incident or breach.
Minimize Downtime. Guarantees your incident is addressed immediately by our team, drastically reducing potential business impact and recovery time.
€29/user/mo)
Why Upgrade to BARE COMPLIANT?
Move to Proactive Security: You stop relying only on automated defense (Tier 1) and start actively hunting for and eliminating risks (Tier 2).
Meet Business Requirements: This tier provides the reporting and risk reduction capabilities often required by business partners, banks, and cybersecurity insurance providers.
Our Target Recommendation: For most SMBs, this tier offers the ideal balance of robust protection, operational efficiency, and verifiable compliance.

