Stage 03 · Ongoing operations

Your security program,
permanently run.

After the Sprint, we become your managed security function. Three tiers — from core operations to full security ownership. Pick the level that matches where you are today. Upgrade as you grow.

Trusted by growing companies

UGC Masters Swapkaart Brain Donors Creative Corner Codelevate Craft Policy

How it works

Not a support contract.
A security operation.

Managed services from Veratlas is the ongoing operation of the security baseline we built during the Sprint. It's not reactive IT support — it's a structured program with reporting, evidence generation, and compliance maintenance built in.

01

Continuous operations

Every endpoint managed, every identity monitored, every offboarding executed and documented. Not when incidents happen — continuously.

02

Evidence generation

Monthly evidence packs, quarterly access reviews, audit logs with defined retention — all generated as part of normal operations, not scrambled together before an audit.

03

Strategic oversight

At the upper tiers, vCISO advisory sessions, risk register maintenance, and board-ready security reporting keep security aligned with company direction.

Secure perimeter

Network security built in,
not bolted on.

Every tier includes network-layer protection. We design, deploy, and manage the infrastructure that keeps your perimeter tight and your traffic clean.

Zero Trust Network Access (ZTNA)

Replace legacy VPNs with identity-aware, application-level access. Users connect only to the resources they need — nothing more. Every session verified, every connection logged.

DNS filtering & threat protection

Block malicious domains, phishing sites, and command-and-control traffic at the DNS layer — before they reach endpoints. Policies follow users regardless of location.

Email security & anti-phishing

Advanced email filtering, DMARC/DKIM/SPF configuration, impersonation protection, and attachment sandboxing. We manage the full email security stack for Microsoft 365 and Google Workspace.

Firewall & network segmentation

Cloud-managed firewalls, micro-segmentation policies, and traffic inspection. We design network architecture that contains breaches and satisfies compliance requirements for PCI DSS, ISO 27001, and SOC 2.

Choose your tier

One relationship.
Three levels of coverage.

Every tier builds on the previous one. Start where you are. Upgrade as your compliance requirements evolve.

01 / Core security operations
The Security Baseline™
"We secure your environment and keep it running."
From €85/user
per month · 12-month minimum · 30 user minimum
  • Every device encrypted, patched, and managed
  • Threats detected and stopped before they spread
  • One identity, one login across every system
  • Email attacks blocked before they reach inboxes
  • Your data backed up and recoverable
  • Passwords secured — no more shared spreadsheets
  • Monthly report proving your security posture
  • Leavers locked out the same day — with audit trail
  • IT issues resolved within 8 business hours
Full tier details
02 / Compliance-led teams Most Popular
The Compliance Engine™
"We secure your environment, prove it to auditors, and reduce your human risk."
From €120/user
per month · 12-month minimum · 40 user minimum
  • Everything in The Security Baseline™
  • Your team trained to spot threats — not just ticking a box
  • Phishing resilience tested every quarter
  • Audit evidence generated automatically every month
  • Access rights reviewed — no orphaned accounts
  • Auditor questions answered — we sit in the room with you
  • Security questionnaires handled (up to 4/quarter)
  • Strategic security advice from an experienced vCISO
  • Faster response: 4-hour standard, 2-hour critical
Full tier details
03 / Full security ownership
The Full Fortress™
"We are your security department. From endpoint to boardroom."
From €165/user
per month · 12-month minimum · 50 user minimum
  • Everything in The Compliance Engine™
  • Zero-trust network access — no open doors
  • Network segmented to contain threats
  • A security leader on your team — without the hire
  • Board-ready security reports every quarter
  • Your vendors assessed before they become a risk
  • Your team tested with realistic incident scenarios
  • Policies reviewed and updated annually
  • New tools vetted for security before adoption
  • Priority response: 1-hour critical, 24x7 coverage
Full tier details

All tiers require a completed Security Assessment or 90-Day Accelerator. See full pricing comparison →

Ready to start?

Stop carrying
security alone.

Book a 30-minute fit call. No sales pitch. Just an honest conversation about where you stand and what it takes to get audit-ready.

Book a Fit Call Get Your Free Snapshot →

30-minute discovery call · No commitment · Europe & USA