Lite Snapshot
Most popular- Recon for 1 - 2 domains or key assets - external only
- Top 3 risks with proof and copy ready fixes
- 1 page Action Map PDF - async delivery
1-page summary delivered in 3 days—no meeting needed.
Fast clarity on your public attack surface. We map what is exposed, prove what is exploitable, and hand you a prioritized plan you can ship now. No meetings required unless you want them.
If we can see it, attackers can too. Fix it before they can exploit it.
1-page summary delivered in 3 days—no meeting needed.
Optional expert Loom walkthrough included on request.
Delivery. Lite 3 business days. Deep 5 business days.
Upgrade credit. Apply 100 percent of Lite toward Deep within 14 days.
Rush option. Lite 48 hours +$250. Deep 72 hours +$500.
3 - 5 minute form. No calls to start.
Read only checks that mirror attacker view. External only.
Evidence you can show to leadership and fixes you can ship now.
| Area | Lite Snapshot | Deep Snapshot |
|---|---|---|
| Price | $1,250 | $2,750 |
| Delivery | 3 business days from intake | 5 business days from intake |
| Scope | 1 - 2 domains or assets - external only | Broader perimeter map across primary domains and third party edges |
| Findings depth | Top 3 risks with proof and fixes | Complete risk inventory with severity and likelihood |
| Email security | MX, SPF, DMARC presence check | Vendor posture review plus SPF or DMARC exposure detail |
| Credential exposure | High signal quick check | Broader leak sweep and rotation guidance |
| Evidence | Screenshots and proof for each top item | Expanded evidence pack with reproducible steps |
| Executive deliverable | 1 page Action Map | Full PDF roadmap plus visual risk matrix |
| Walkthrough | Async delivery | Optional Loom walkthrough included on request |
Submit domains or key assets and consent. 3 - 5 minutes.
Public only checks. What we see is what attackers can see.
We verify exploitability and collect evidence.
Rank by severity, likelihood, and blast radius.
PDF + Action Map. Optional walkthrough for Deep.
External only. No agents. No credentials. No production impact. We use public data and safe checks.
Data handling. We store scope consent and redact sensitive details in screenshots. Evidence links are private to you.
Not included. Internal scans, full pen testing, remediation work, and 24/7 monitoring are out of scope. If you need those, we can advise next steps.
No. Snapshot uses only public data and external checks. No access to your internal systems and no credentials required.
Lite delivers in 3 business days from intake. Deep delivers in 5 business days. Rush options are available.
Founders, IT managers, and lean teams who want fast clarity and a plan they can act on now.