Pricing
Transparent, flexible cybersecurity pricing that delivers expert protection, continuous testing, and measurable value for your organisation.
Mirage Surface
External Attack Surface Monitoring
External Attack Surface Management (EASM) is a cybersecurity practice that continuously discovers, analyzes, and mitigates risks from internet-facing assets (such as websites, APIs, cloud services, and Shadow IT) that are often unknown or unmanaged. It provides an outside-in view to help organisations remediate vulnerabilities, reduce security risks, and ensure compliance.
Surface Starter
Best for small organisation that only needs to monitor a single domain.
£750
- per month
Includes:
- 1 Domain
- Unlimited Scanning
- 3 Team Members
Features:
- 14-day free trial
- Single domain monitoring
- Automated asset discovery
- Subdomain enumeration
- Dark web monitoring
- Telegram monitoring
- Pastebin monitoring
- Leaked credential monitoring
- Cloud asset detection
Ideal For:
Small to mid-sized organisations requiring baseline security assurance.
Surface Professional
Best for organistions that have multiple domains and a large number of assets.
£1,750
- per month
Includes:
- 5 Domains
- Unlimited Scanning
- 10 Team Members
Features:
- Multiple domain monitoring
- Improved team access
- Automated asset discovery
- Subdomain enumeration
- Dark web monitoring
- Telegram monitoring
- Pastebin monitoring
- Leaked credential monitoring
- Cloud asset detection
Ideal For:
Growing organisations managing compliance and evolving threat environments.
Surface Enterprise
Best for large enterprises that have global assets and regional offices with shadow IT.
£4,000
- per month
Includes:
- Unlimited Domains
- Unlimited Scanning
- Unlimited Team Members
Features:
- Unrestricted access to monitoring
- Multiple domain monitoring
- Automated asset discovery
- Subdomain enumeration
- Dark web monitoring
- Telegram monitoring
- Pastebin monitoring
- Leaked credential monitoring
- Cloud asset detection
Ideal For:
Large organisations, regulated industries, and critical infrastructure providers.
Mirage Validate
Penetration Testing as a Service
Penetration Testing as a Service (PTaaS) is a cloud-delivered, subscription-based model for security testing that provides continuous, on-demand vulnerability assessments rather than traditional, one-time annual reports. It combines automated scanning with human expertise, offering real-time visibility into security vulnerabilities via our amazing portal.
10 Credits
Starter credit pack for Penetration Testing as a Service. 10 credits for on-demand security testing.
Example Pricing:
£5,000
5 Days Testing
Includes:
- 0% bulk buy discount
- All testing methodologies
- Compliance mapping (PCI, SOC2, ISO27001)
- Executive summaries
- Detailed remediation guidance
- Ondemand scheduling
- Access to portal
20 Credits
Professional credit pack for regular security assessments. Ideal for quarterly testing cycles.
Example Pricing:
£9,500
10 Days Testing
Includes:
- 5% bulk buy discount
- All testing methodologies
- Compliance mapping (PCI, SOC2, ISO27001)
- Executive summaries
- Detailed remediation guidance
- Ondemand scheduling
- Access to portal
40 Credits
Enterprise credit pack for comprehensive, ongoing security validation programmes with greater discounts.
Example Pricing:
£19,000
20 Days Testing
Includes:
- 10% bulk buy discount
- All testing methodologies
- Compliance mapping (PCI, SOC2, ISO27001)
- Executive summaries
- Detailed remediation guidance
- Ondemand scheduling
- Access to portal
Mirage Adversary
Red Teaming as a Service
Red Teaming as a Service (RTaaS) is a subscription-based, continuous security model where ethical hackers simulate sophisticated, multi-stage cyberattacks against an organisation’s people, processes, and technology. Unlike one-time penetration tests, RTaaS offers ongoing, on-demand testing to evaluate an organisation’s ability to detect, prevent, and respond to real-world threats
Adversary Assessment
Single red team campaign to test your organisation against realistic attack scenarios.
Includes:
- Full red team campaign
- Senior red team specialists
- Custom threat scenarios
- Social engineering
- Assumed breach scenarios
- Attack path mapping
- Evolving threat scenarios
- APT simulation
- Ransomware simulation
- Business email compromise testing
- Detection & response testing
- Real-time attack simulation
- Custom malware development
- Zero-day simulation
Adversary Program
Quarterly red team engagements to continuously challenge and improve your security defences.
Includes:
- 4 red team campaigns per year
- Senior red team specialists
- Custom threat scenarios
- Social engineering
- Assumed breach scenarios
- Attack path mapping
- Evolving threat scenarios
- APT simulation
- Ransomware simulation
- Business email compromise testing
- Detection & response testing
- Real-time attack simulation
- Custom malware development
- Zero-day simulation
Adversary Partnership
Always-on red team operations providing continuous adversary simulation and security validation.
Includes:
- Continuous red team operations
- Dedicated adversary team
- Custom threat scenarios
- Social engineering
- Assumed breach scenarios
- Attack path mapping
- Evolving threat scenarios
- APT simulation
- Ransomware simulation
- Business email compromise testing
- Detection & response testing
- Real-time attack simulation
- Custom malware development
- Zero-day simulation
Transparent Pricing Built Around Your Security Needs
Pentesys provides flexible cybersecurity pricing designed to support organizations of all sizes. Our pricing reflects the depth of testing, level of ongoing monitoring, and expert support required to protect your business effectively. Whether you need a one-time assessment or continuous testing, we provide scalable solutions that deliver measurable security value.
Why Continuous Testing Matters
Stronger Security Posture
Identify risks before attackers do.
Regulatory Compliance
Ensure you meet industry standards and audits.
Reduced Risk of Breaches
Continuous monitoring prevents unnoticed vulnerabilities.
Faster Remediation
Track, assign, and fix issues quickly through our portal.
Cost-Efficient
Proactive testing reduces emergency response costs and downtime.
Request a Custom Security Quote
Every organization has unique security requirements. Speak with our cybersecurity experts to receive a customized pricing proposal tailored to your risk profile, infrastructure, and compliance needs.
4.9 out of 5 stars from 47 reviews
Start Strengthening Your Security Today
Discover which security package best fits your organization and gain expert guidance on building a stronger cybersecurity strategy.