FAQs
Software Cybersecurity
— One Time Cybersecurity Services —
Premium
Standard
Plus
Custom
Surface Scan
Customized Plans Available
Advanced Scan
Posture Consult
Penetration Test
$20,000
Varies
$7,500
$2,500
Price
— Ongoing Cybersecurity Services —
Premium
Custom
Plus
Plans
Standard
Everything in Standard, and:Quarterly ScansAnnual Posture Review Security Training Event Response
Customized Plans Available
Everything in Plus, and: Monthly Scans Annual Pen Test
Bi-Annual ScansDark Web Monitoring
What's Included
$260
$800
Varies
$2,500
Monthly Price
Back To Pricing
FAQs
Click on each FAQ to learn more
Is it necessary to buy the one-time service before going onto an ongoing plan?
What is the difference between a security posture consultation and a penetration test?
Do your ongoing plans require a contract for a specific time?
Are these services available for any software systems?
How are these services different from those my IT or Managed Service Provider perform?
Do I need these services if my software does not contain sensitive data?
What types of vulnerabilities do these services protect me against?
How are these services different from those that my IT or Managed Service Provider perform?
Most IT departments and Managed Service Providers limit scanning to the network and infrastructure. This is limited in the ability to indentify many application specific vulnerabilities that could put your business at risk. If you are unsure whether these services are covered by your current IT team, just ask and we can help you determine this.
Ongoing Security Services
Depending on your plan level, ongoing services may include regular surface and advance scans, posture consults, and pen tests. Ongoing services also include security training, enhanced dark web monitoring, and security event response as described below. Security Training: This security training includes interactive modules, videos, and quizzes designed to teach employees how to recognize and avoid phishing attempts, malware, and other common cyber threats.
Enhanced Dark Web Monitoring: Miles IT monitors thousands of cybercrime channels across sources. This monitoring allows action to be taken as early as possible, many times before a breach has occurred.
Security Event Response: Miles IT will analyze the security event, assess the situation, and provide a report with findings and next steps for remediation. Our security consultant will review the action plan and any associated costs with you to ensure swift and effective resolution.
Standard Package is Recommended For:
The Standard Package is recommended for every business that has custom business software that are used by internal staff and do not include confidential information, such as PII or PHI, and are not subject to compliance regulations.
Plus Package is Recommended For:
The Plus Package is recommended for companies that have custom software that is business critical, contains confidential business information, or provide external user access to customers, partners, public users (i.e. web portals).
Scope of Work: Analysis & Consultation
Security Services and Activities
- Surface Scans (Platforms + Envrionment): Security scan of core platform(s) and hosting environment components to identify potential known vulnerabilities which can be identified without actually performing activities that could maliciously impact the system.
- Advanced Vulnerability Scan & Report: Identifies known vulnerabilities, potential remediation recommendations, and customized analysis of results & recommendations from Miles IT security analysts in a compiled report.
- Annual Software Penetration Testing: We have professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system.
.
- Semi-Annual Secuirty Posture Consultation: Miles IT security consultant will spend up to ½ day to review your systems and processes, and provide a report regarding their security posture.
- Semi-Annual Secuirty Posture Consultation: Miles IT security consultant will spend up to ½ day to review your systems and processes, and provide a report regarding their security posture.
Do your ongoing plans require a contract for a specific time?
There are no long term contract requirements. You will get the most value from your plan by maintaining it on an ongoing basis.
Important Notes
- We can provide more in-depth analysis & consultation that includes process analysis, a more extensive analysis of software beyond the core systems, and/or a more in-depth architecture or requirement analysis. If you feel you would benefit from a more in-depth analysis & consultation, let us know and we can provide a custom estimate!
- MIT is available to assist with any remediation upon request for an additional cost.
- Our scans test against potential risks and vulnerabilities. There may still be unknown or undiscovered vulnerabilities at the conclusion of this project. We recommend on-going efforts as more vulnerabilities are identified over time. These may be identified between the initial and the follow-up efforts for an additional cost.
- We can expedite this project if you require that it be completed sooner. Expediting a project is disruptive to our workflow and increases our costs, so there are additional charges. Please speak with your representative if you wish to explore this option.
- CONFIDENTIALITY: The above and enclosed data, configuration, and prices are confidential and proprietary to Miles Technologies. All or any part of the above and the enclosed shall not be released to any third party. Copyright and all rights are reserved by Miles IT.
Click Here to Learn More About Our Other Services
Advanced Vulnerability Scan
We will run a dynamic vulnerability scan against your site to identify known vulnerabilities, potential remediation recommendations. Our security consultants will review the results and perform a customized analysis of results & provide recommendations in a compiled report.
Surface Scan
The surface scan will be run against the core platform(s) and hosting environment components of your software to identify potential known vulnerabilities that could maliciously impact the system.
What Types of Vulnerabilities Do These Services Protect Me Against?
Our software cybersecurity services can protect you against a plethora of vulnerabilities, including authentication and acccess control weaknesses, injection attacks, cross site scripting, misconfigured settings, outdated software components, insecure APIs, and insecure data storage to name a few.
Cybersecurity Packages
Hover over each of the packages below to learn more about what's included.
Plus
Premium
Standard
$799/Month
$299/Month
Varies
Overview
Do you need more peace of mind and reassurance that your system will stand up against a malicious attack? We have professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system. Our software security packages are devised to help protect you against these risks.
Is it necessary to buy the one time package before going onto an ongoing plan?
Yes. It is necessary to perform the one-time foundational security services provided through our one-time packages prior to going onto an ongoing plan. Once you perform a one-time services, you can choose to stop there or go onto any ongoing plan at or lower than the level of your one-time package. If you choose to stop your ongoing plan, it will be necessary to perform a one-time package again prior to restarting a new plan.
What Types of Vulnerabilities Do These Services Protect Me Against?
Our software cybersecurity services can protect you against a plethora of vulnerabilities, including authentication and acccess control weaknesses, injection attacks, cross site scripting, misconfigured settings, outdated software components, insecure APIs, and insecure data storage to name a few.
Do I need these services if my application does not contain sensitive data?
Absolutely. Software security is still critical even if your software doesn’t handle highly sensitive data. Passwords, for example, are sensitive and a prime target for hackers. Additionally, attackers can exploit vulnerabilities in your system to gain control, disrupt operations, or use your software as a means to initiate phishing schemes or as a launching pad for other larger attacks.
Advanced Vulnerability Scan
We will run a dynamic vulnerability scan against your site to identify known vulnerabilities, potential remediation recommendations. Our security consultants will review the results and perform a customized analysis of results & provide recommendations in a compiled report.
Are these services available for any software systems?
Our software cybersecurity packages are intended for most custom web and mobile applications.
Just ask and we can verify whether your specific technology stack and architecture are able to be covered under one of our standard packages.
Ongoing Security Services
Depending on your plan level, ongoing services may include regular surface and advance scans, posture consults, and pen tests. Ongoing services also include security training, enhanced dark web monitoring, and security event response as described below. Security Training: This security training includes interactive modules, videos, and quizzes designed to teach employees how to recognize and avoid phishing attempts, malware, and other common cyber threats.
Enhanced Dark Web Monitoring: Miles IT monitors thousands of cybercrime channels across sources. This monitoring allows action to be taken as early as possible, many times before a breach has occurred.
Security Event Response: Miles IT will analyze the security event, assess the situation, and provide a report with findings and next steps for remediation. Our security consultant will review the action plan and any associated costs with you to ensure swift and effective resolution.
Security Posture Consultation
Miles IT security consultants will review your systems and related business processes to evaluate how the system is configured and used to identify potential cybersecurity risks. We will provide a report outlining your security posture and any recommendations.
Security Posture Consultation
Miles IT security consultants will review your systems and related business processes to evaluate how the system is configured and used to identify potential cybersecurity risks. We will provide a report outlining your security posture and any recommendations.
Other Services
Other services that can simplify your systems may include user interface & user experience re-engineering, process simplification, vendor and/or team consolidation. The benefits of simplifying your systems include ease of supporting and advancing your systems & business.
Simple Projects
Complex Projects
Mid-Size Projects
- Performance Analysis & Recommendations
- Security Analysis & Recommendations
- UX Analysis & Recommendations
- Simple configuration or infrastructure that do not require coding
- Changing or adding hardware, tools, solutions, scripts
- Implementation of recommendation to improve the overall performance, security, or user experience that support a set of business processes
- Consulting services to recommend changes that would allow for more efficient and effective business processes leveraging technology
- Performance, Security, UX analysis, recommendations, & implementation for Enterprise systems or software products
- Advanced or extending business technology consulting
Are these services available for any software systems?
Our software cybersecurity packages are intended for most custom web and mobile applications.
Just ask and we can verify whether your specific technology stack and architecture are able to be covered under one of our standard packages.
What is the difference between a security audit and a penetration test?
Security Posture Consultation: Miles IT Security Consultant will review your systems and processes, and provide a report regarding your company's security posture. Software Penetration Test: Miles IT has professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system.
Do I need these services if my application does not contain sensitive data?
Absolutely. Software security is still critical even if your software doesn’t handle highly sensitive data. Passwords, for example, are sensitive and a prime target for hackers. Additionally, attackers can exploit vulnerabilities in your system to gain control, disrupt operations, or use your software as a means to initiate phishing schemes or as a launching pad for other larger attacks.
What is the difference between a security audit and a penetration test?
Security Posture Consultation: Miles IT Security Consultant will review your systems and processes, and provide a report regarding your company's security posture. Software Penetration Test: Miles IT has professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system.
Surface Scan
The surface scan will be run against the core platform(s) and hosting environment components of your software to identify potential known vulnerabilities that could maliciously impact the system.
How are these services different from those that my IT or Managed Service Provider perform?
Most IT departments and Managed Service Providers limit scanning to the network and infrastructure. This is limited in the ability to indentify many application specific vulnerabilities that could put your business at risk. If you are unsure whether these services are covered by your current IT team, just ask and we can help you determine this.
Do your ongoing plans require a contract for a specific time?
There are no long term contract requirements. You will get the most value from your plan by maintaining it on an ongoing basis.
Premium Package is Recommended For:
The Premium Package is recommended for companies with custom software that contains PII, PHI, or other confidential information, are subject to compliance requirements, or would pose a major business risk if compromised (e.g. companies generating significant revenue through the software).
Modernizing Systems
Modernization services include upgrading outdated systems to implement modern technologies. The benefits of modernization include improved security, streamlined business processes, reduced risk of system failures, and an overall increased ability to support & advance the systems.
Simple Projects
Complex Projects
Mid-Size Projects
Updating many types of existing software to the latest version
Replacing outdated packaged software with newer software that provides improved
Redeveloping outdated and complex custom software
Penetration Testing
Our cybersecurity experts will peform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets, including personal financial, and other confidential information within your system.
Standard Package is Recommended For:
The Standard Package is recommended for every business that has custom business software that are used by internal staff and do not include confidential information, such as PII or PHI, and are not subject to compliance regulations.
System Support Services
Support services include helpdesk, break/fix support, proactive services to keep your system secure and performing well, and ongoing consultation. The benefits of software support include valuable proactive services, as well as access to a dedicated team of support specialists that are ready to help answer questions or resolve issues with your applications.
Simple
Advanced
Standard
Ongoing vulnerability scans and security-related service options
Full support of your software systems, including helpdesk, maintenance, and advancement
Full support + customized services tailor-fit to your needs
Is it necessary to buy the one time package before going onto an ongoing plan?
Yes. It is necessary to perform the one-time foundational security services provided through our one-time packages prior to going onto an ongoing plan. Once you perform a one-time services, you can choose to stop there or go onto any ongoing plan at or lower than the level of your one-time package. If you choose to stop your ongoing plan, it will be necessary to perform a one-time package again prior to restarting a new plan.
Premium Package is Recommended For:
The Premium Package is recommended for companies with custom software that contains PII, PHI, or other confidential information, are subject to compliance requirements, or would pose a major business risk if compromised (e.g. companies generating significant revenue through the software).
Plus Package is Recommended For:
The Plus Package is recommended for companies that have custom software that is business critical, contains confidential business information, or provide external user access to customers, partners, public users (i.e. web portals).
Penetration Testing
Our cybersecurity experts will peform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets, including personal financial, and other confidential information within your system.
Cybersecurity Packages
Miles IT
Created on May 30, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Online Product Catalog
View
Vintage Advent Calendar
View
Professional Advent Calendar
View
Interactive Event Microsite
View
January School Calendar
View
Genial Calendar 2026
View
Annual calendar 2026
Explore all templates
Transcript
FAQs
Software Cybersecurity
— One Time Cybersecurity Services —
Premium
Standard
Plus
Custom
Surface Scan
Customized Plans Available
Advanced Scan
Posture Consult
Penetration Test
$20,000
Varies
$7,500
$2,500
Price
— Ongoing Cybersecurity Services —
Premium
Custom
Plus
Plans
Standard
Everything in Standard, and:Quarterly ScansAnnual Posture Review Security Training Event Response
Customized Plans Available
Everything in Plus, and: Monthly Scans Annual Pen Test
Bi-Annual ScansDark Web Monitoring
What's Included
$260
$800
Varies
$2,500
Monthly Price
Back To Pricing
FAQs
Click on each FAQ to learn more
Is it necessary to buy the one-time service before going onto an ongoing plan?
What is the difference between a security posture consultation and a penetration test?
Do your ongoing plans require a contract for a specific time?
Are these services available for any software systems?
How are these services different from those my IT or Managed Service Provider perform?
Do I need these services if my software does not contain sensitive data?
What types of vulnerabilities do these services protect me against?
How are these services different from those that my IT or Managed Service Provider perform?
Most IT departments and Managed Service Providers limit scanning to the network and infrastructure. This is limited in the ability to indentify many application specific vulnerabilities that could put your business at risk. If you are unsure whether these services are covered by your current IT team, just ask and we can help you determine this.
Ongoing Security Services
Depending on your plan level, ongoing services may include regular surface and advance scans, posture consults, and pen tests. Ongoing services also include security training, enhanced dark web monitoring, and security event response as described below. Security Training: This security training includes interactive modules, videos, and quizzes designed to teach employees how to recognize and avoid phishing attempts, malware, and other common cyber threats. Enhanced Dark Web Monitoring: Miles IT monitors thousands of cybercrime channels across sources. This monitoring allows action to be taken as early as possible, many times before a breach has occurred. Security Event Response: Miles IT will analyze the security event, assess the situation, and provide a report with findings and next steps for remediation. Our security consultant will review the action plan and any associated costs with you to ensure swift and effective resolution.
Standard Package is Recommended For:
The Standard Package is recommended for every business that has custom business software that are used by internal staff and do not include confidential information, such as PII or PHI, and are not subject to compliance regulations.
Plus Package is Recommended For:
The Plus Package is recommended for companies that have custom software that is business critical, contains confidential business information, or provide external user access to customers, partners, public users (i.e. web portals).
Scope of Work: Analysis & Consultation
Security Services and Activities
- Surface Scans (Platforms + Envrionment): Security scan of core platform(s) and hosting environment components to identify potential known vulnerabilities which can be identified without actually performing activities that could maliciously impact the system.
- Advanced Vulnerability Scan & Report: Identifies known vulnerabilities, potential remediation recommendations, and customized analysis of results & recommendations from Miles IT security analysts in a compiled report.
- Annual Software Penetration Testing: We have professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system.
.Do your ongoing plans require a contract for a specific time?
There are no long term contract requirements. You will get the most value from your plan by maintaining it on an ongoing basis.
Important Notes
Click Here to Learn More About Our Other Services
Advanced Vulnerability Scan
We will run a dynamic vulnerability scan against your site to identify known vulnerabilities, potential remediation recommendations. Our security consultants will review the results and perform a customized analysis of results & provide recommendations in a compiled report.
Surface Scan
The surface scan will be run against the core platform(s) and hosting environment components of your software to identify potential known vulnerabilities that could maliciously impact the system.
What Types of Vulnerabilities Do These Services Protect Me Against?
Our software cybersecurity services can protect you against a plethora of vulnerabilities, including authentication and acccess control weaknesses, injection attacks, cross site scripting, misconfigured settings, outdated software components, insecure APIs, and insecure data storage to name a few.
Cybersecurity Packages
Hover over each of the packages below to learn more about what's included.
Plus
Premium
Standard
$799/Month
$299/Month
Varies
Overview
Do you need more peace of mind and reassurance that your system will stand up against a malicious attack? We have professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system. Our software security packages are devised to help protect you against these risks.
Is it necessary to buy the one time package before going onto an ongoing plan?
Yes. It is necessary to perform the one-time foundational security services provided through our one-time packages prior to going onto an ongoing plan. Once you perform a one-time services, you can choose to stop there or go onto any ongoing plan at or lower than the level of your one-time package. If you choose to stop your ongoing plan, it will be necessary to perform a one-time package again prior to restarting a new plan.
What Types of Vulnerabilities Do These Services Protect Me Against?
Our software cybersecurity services can protect you against a plethora of vulnerabilities, including authentication and acccess control weaknesses, injection attacks, cross site scripting, misconfigured settings, outdated software components, insecure APIs, and insecure data storage to name a few.
Do I need these services if my application does not contain sensitive data?
Absolutely. Software security is still critical even if your software doesn’t handle highly sensitive data. Passwords, for example, are sensitive and a prime target for hackers. Additionally, attackers can exploit vulnerabilities in your system to gain control, disrupt operations, or use your software as a means to initiate phishing schemes or as a launching pad for other larger attacks.
Advanced Vulnerability Scan
We will run a dynamic vulnerability scan against your site to identify known vulnerabilities, potential remediation recommendations. Our security consultants will review the results and perform a customized analysis of results & provide recommendations in a compiled report.
Are these services available for any software systems?
Our software cybersecurity packages are intended for most custom web and mobile applications. Just ask and we can verify whether your specific technology stack and architecture are able to be covered under one of our standard packages.
Ongoing Security Services
Depending on your plan level, ongoing services may include regular surface and advance scans, posture consults, and pen tests. Ongoing services also include security training, enhanced dark web monitoring, and security event response as described below. Security Training: This security training includes interactive modules, videos, and quizzes designed to teach employees how to recognize and avoid phishing attempts, malware, and other common cyber threats. Enhanced Dark Web Monitoring: Miles IT monitors thousands of cybercrime channels across sources. This monitoring allows action to be taken as early as possible, many times before a breach has occurred. Security Event Response: Miles IT will analyze the security event, assess the situation, and provide a report with findings and next steps for remediation. Our security consultant will review the action plan and any associated costs with you to ensure swift and effective resolution.
Security Posture Consultation
Miles IT security consultants will review your systems and related business processes to evaluate how the system is configured and used to identify potential cybersecurity risks. We will provide a report outlining your security posture and any recommendations.
Security Posture Consultation
Miles IT security consultants will review your systems and related business processes to evaluate how the system is configured and used to identify potential cybersecurity risks. We will provide a report outlining your security posture and any recommendations.
Other Services
Other services that can simplify your systems may include user interface & user experience re-engineering, process simplification, vendor and/or team consolidation. The benefits of simplifying your systems include ease of supporting and advancing your systems & business.
Simple Projects
Complex Projects
Mid-Size Projects
Are these services available for any software systems?
Our software cybersecurity packages are intended for most custom web and mobile applications. Just ask and we can verify whether your specific technology stack and architecture are able to be covered under one of our standard packages.
What is the difference between a security audit and a penetration test?
Security Posture Consultation: Miles IT Security Consultant will review your systems and processes, and provide a report regarding your company's security posture. Software Penetration Test: Miles IT has professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system.
Do I need these services if my application does not contain sensitive data?
Absolutely. Software security is still critical even if your software doesn’t handle highly sensitive data. Passwords, for example, are sensitive and a prime target for hackers. Additionally, attackers can exploit vulnerabilities in your system to gain control, disrupt operations, or use your software as a means to initiate phishing schemes or as a launching pad for other larger attacks.
What is the difference between a security audit and a penetration test?
Security Posture Consultation: Miles IT Security Consultant will review your systems and processes, and provide a report regarding your company's security posture. Software Penetration Test: Miles IT has professional cyber security experts that will perform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets (personal, financial, or other confidential information) within your system.
Surface Scan
The surface scan will be run against the core platform(s) and hosting environment components of your software to identify potential known vulnerabilities that could maliciously impact the system.
How are these services different from those that my IT or Managed Service Provider perform?
Most IT departments and Managed Service Providers limit scanning to the network and infrastructure. This is limited in the ability to indentify many application specific vulnerabilities that could put your business at risk. If you are unsure whether these services are covered by your current IT team, just ask and we can help you determine this.
Do your ongoing plans require a contract for a specific time?
There are no long term contract requirements. You will get the most value from your plan by maintaining it on an ongoing basis.
Premium Package is Recommended For:
The Premium Package is recommended for companies with custom software that contains PII, PHI, or other confidential information, are subject to compliance requirements, or would pose a major business risk if compromised (e.g. companies generating significant revenue through the software).
Modernizing Systems
Modernization services include upgrading outdated systems to implement modern technologies. The benefits of modernization include improved security, streamlined business processes, reduced risk of system failures, and an overall increased ability to support & advance the systems.
Simple Projects
Complex Projects
Mid-Size Projects
Updating many types of existing software to the latest version
Replacing outdated packaged software with newer software that provides improved
Redeveloping outdated and complex custom software
Penetration Testing
Our cybersecurity experts will peform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets, including personal financial, and other confidential information within your system.
Standard Package is Recommended For:
The Standard Package is recommended for every business that has custom business software that are used by internal staff and do not include confidential information, such as PII or PHI, and are not subject to compliance regulations.
System Support Services
Support services include helpdesk, break/fix support, proactive services to keep your system secure and performing well, and ongoing consultation. The benefits of software support include valuable proactive services, as well as access to a dedicated team of support specialists that are ready to help answer questions or resolve issues with your applications.
Simple
Advanced
Standard
Ongoing vulnerability scans and security-related service options
Full support of your software systems, including helpdesk, maintenance, and advancement
Full support + customized services tailor-fit to your needs
Is it necessary to buy the one time package before going onto an ongoing plan?
Yes. It is necessary to perform the one-time foundational security services provided through our one-time packages prior to going onto an ongoing plan. Once you perform a one-time services, you can choose to stop there or go onto any ongoing plan at or lower than the level of your one-time package. If you choose to stop your ongoing plan, it will be necessary to perform a one-time package again prior to restarting a new plan.
Premium Package is Recommended For:
The Premium Package is recommended for companies with custom software that contains PII, PHI, or other confidential information, are subject to compliance requirements, or would pose a major business risk if compromised (e.g. companies generating significant revenue through the software).
Plus Package is Recommended For:
The Plus Package is recommended for companies that have custom software that is business critical, contains confidential business information, or provide external user access to customers, partners, public users (i.e. web portals).
Penetration Testing
Our cybersecurity experts will peform penetration testing, exploit vulnerabilities, and attempt to gain access to high value targets, including personal financial, and other confidential information within your system.