Your cybersecurity credits
As a cybersecurity company, we offer 3 flexible credits packages to perfectly match your needs, providing scalable and cost-effective protection. Use your credits for 24/7 expert support on any task or project, big or small, and unburden your organization’s to-do list.
Design Endpoint Security based on MS Defender
Configure your Microsoft Defender environment according to best practices and company requirements.
Design Endpoint Security based on Cortex XDR
Configure your Palo Alto XDR environment according to best practices and company requirements.
Design Prisma Cloud Enterprise
Implement cloud security from your repositories to the runtime, securing your code, your pipeline and your containers.
IPv6 design
Together, we design and plan your migration to IPv6, based on your environment wishes and our experience.
global protect design
A secure and robust VPN architecture based on your architecture and wishes, completely with ZTNA.
SD-WAN Design
SASE or On-Prem, a ZTNA scalable and robust design based on your environment and future plans.
Secure Network Design
We align Zero Trust from the firewall and endpoint into the network with you.
Zero Trust
fast Track
We transform the architecture and ensure you can continue your Zero Trust journey independently.
Zero Trust Coaching
We guide you along your ZT journey and challenge you to keep moving forward, safeguarding your progress.
Design Prisma Access (SASE)
We design your SASE environment, tailored to your perfect mix of cloud, SaaS and On-Prem infrastructure.
IOT Security Network design
We design a secure IoT network – flexible, practical and future-proof.
XSOAR
We design a secure XSOAR setup – flexible, practical and future-proof.
XSIAM
We design a secure XSIAM setup – flexible, practical and future-proof.
Implement Cortex XDR
Our experience aids you in design and implementation for your endpoint security solution.
Implement MS Defender for endpoint
Our experience aids you in design and implementation for your MS Defender endpoint security solution.
IMPLEMENT
SD-WAN
We implement SD-WAN with and for you.
Implement Greenfield Palo Alto NETWORKS Firewall
A greenfield implementation of a PAN firewall based on best practices, as suited to your environment.
Implement Greenfield Fortinet Firewall
A greenfield implementation of a Fortinet firewall based on best practices, as suited to your environment.
Implement User-ID
Transform to a Kipling rule base, enabling you to move to Zero Trust by linking traffic and flows.
Firewall upgrade
A firewall upgrade and replacement, completely planned and prepared.
Implement Panorama
We implement Panorama and onboard your pre-existing firewalls for you.
Implement GlobalProtect
VPN architecture based on your architecture and wishes, completely ZTNA.
Implement Network Changes
Certified multi-disciplinary consultants aid you in network architecture changes.
Implement SSL Decryption
SSL Decryption, enabling full use of all your security measures and insights of your traffic.
Implement Greenfield Azure Palo Alto Firewall
Certified help to design and implement a redundant, scalable Palo Alto Networks firewall environment in Azure.
Implement Prisma Access SASE
Implement SASE environment with mix of cloud, SaaS and On-Prem infrastructure.
IMPLEMENT IOT Security
Implement a secure IoT network design – flexible, practical and future-proof.
IMPLEMENT Medical OT Security
Implement secure IoT network design, focused on Medical OT.
IMPLEMENT Industrial OT Security
Design secure IoT network, focused on Industrial OT.
Implement XSOAR
We help you implement XSOAR.
Implement XSIAM
We help you implement XSIAM.
Virtual CISO
A virtual Chief Information Security Officer (vCISO) for better insight into your cybersecurity.
Endpoint Security Architect
Together, we design your endpoint security, based on your requirements and needs.
Network Security Architect
Together, we design your network security, based on your requirements and needs.
Cloud Security Architect
Design and implementation of your cloud transformation.
Support with Kubernetes
We support and aid you in all topics and security with your Kubernetes setup.
Support with Palo Alto Networks
We support and aid you in all topics and security with your Palo Alto Networks setup.
Support with Microsoft Security suite
We support and aid you in all topics with your Microsoft Security Suite setup.
Palo Alto Networks EDU-210
Firewall Essentials – Configuration and Management.
Palo Alto Networks EDU-220
Panorama – Managing Firewalls at Scale.
Palo Alto Networks EDU-260
Cortex XDR: Prevention and Deployment.
Palo Alto Networks EDU-330
Firewall: Troubleshooting.
Palo Alto Networks EDU-238
Prisma SD-WAN: Design and Operation.
Palo Alto Networks EDU-318
Prisma Access SASE Security: Design and Operation.
Palo Alto Networks EDU-380
Cortex XSOAR: Automation and Orchestration.
Palo Alto Networks EDU-262
Cortex XDR: Investigation and Response.
Palo Alto Networks EDU-270
Cortex XSIAM
Zero Trust Training
Accelerating the implementation of your Zero Trust strategy on a strategic, managerial and operational level.
BIO Impact Assessment
Determine if your security strategy is aligned with the Baseline Informatie-beveiliging Overheid (BIO) requirements.
EXTENDED BIO Impact Assessment
Assessment consists of the default assessment along with a Zero Trust extension through additional workshops.
NIS2 Impact Assessment
Determine to what extent your security strategy is aligned with the NIS2 Directive regulatory requirements.
EXTENDED NIS2 Impact Assessment
Assessment of your security strategy for NIS2 along with a Zero Trust extension through additional workshops.
DORA Impact Assessment
Determine if your security strategy is aligned with the Digital Operational Resilience Act.
EXTENDED DORA Impact Assessment
This assessment consists of the default assessment along with a Zero Trust extension through workshops.
Zero Trust Training
Accelerating the implementation of your Zero Trust strategy on a strategic, managerial and operational level.
SASE & SLR Scan
Validate your SASE and security setup and gain insights into the effectiveness of your current setup.
health check for Fortinet Firewalls
ON2IT Best Practice Assessment and health check for Fortinet Firewalls.
health check for Palo Alto Networks Firewalls
ON2IT Best Practice Assessment and health check for Palo Alto Networks Firewalls.
Cloud Security Report
Gain insights into the security state of your public cloud environments.
Best Practice check Microsoft Defender for Endpoint
Validate your Microsoft Defender for Endpoint configuration against industry best-practices.
Best Practice check Microsoft Defender for O365
Validate your Microsoft Defender for Office 365 configuration against industry best-practices.
Best Practice check Microsoft Defender for Identify
Validate your Microsoft Defender for Identity configuration against industry best-practices.
Best Practice check Microsoft Defender for Cloud appS
Validate your Microsoft Defender for Cloud Apps configuration against industry best-practices.
IOT Reach and Risk scan
Validate the effectiveness of your IOT security.
Incident Response Readiness
Assess your existing incident response resources and processes to achieve internal alignment and identify prioritized improvements.
Incident Response fast track
Validate your existing response capabilities and implemented improvements through a realistic incident simulation.
Incident Response coaching
Further improve and mature your incident response capabilities with hands-on support and training provided by our experts.
Zero Trust Readiness 2.0
Workshop which helps you implement your Zero Trust strategy on a strategic level.
Zero Trust Rule base conversion
Convert your firewall rule base to a Zero Trust rule base.
Zero Trust TRAINING
Speed up the implementation of your Zero Trust strategy using our unique Zero Trust Readiness methodology.
Zero Trust COACHING
We guide you along your Zero Trust journey. We challenge you and your organization to keep moving forward, safeguarding your progress.
Zero Trust
FAST TRACK
Guided kick-start into your first protect surfaces or extra protect surfaces.
IPv6 design
Together, we design and plan your migration to IPv6, based on your environment wishes and our experience.
global protect design
A secure and robust VPN architecture based on your architecture and wishes, completely with ZTNA.
SD-WAN Design
SASE or On-Prem, a ZTNA scalable and robust design based on your environment and future plans.
Zero Trust
fast Track
We transform the architecture and ensure you can continue your Zero Trust journey independently.
IOT Security Network design
We design a secure IoT network – flexible, practical and futureproof.
NIS2 Impact Assessment
Determine to what extent your security strategy is aligned with the NIS2 Directive regulatory requirements.
DORA Impact Assessment
Determine if your security strategy is aligned with the Digital Operational Resilience Act.
Incident Response fast Track
Validate your existing response capabilities and implemented improvements through a realistic incident simulation.
IPv6 design
Together, we design and plan your migration to IPv6, based on your environment wishes and our experience.
Zero Trust Coaching
We guide you along your Zero Trust journey. We challenge you and your organization to keep moving forward, safeguarding your progress.
IOT Security Network design
We design a secure IoT network – flexible, practical and futureproof.
Implement SSL Decryption
SSL Decryption, enabling full use of all your security measures and insights of your traffic.
Virtual CISO
A virtual Chief Information Security Officer (vCISO) for better insight into your cybersecurity.
NIS2 Impact Assessment
Determine to what extent your security strategy is aligned with the NIS2 Directive regulatory requirements.
EXTENDED
DORA Impact Assessment
This assessment consists of the default assessment along with a Zero Trust extension through workshops.
Zero Trust Readiness 2.0
Workshop which helps you implement your Zero Trust strategy on a strategic level.
Frequently Asked Questions (FAQ) – ON2IT Credits
Our customers deserve more flexibility and accessibility for a wide range of services and tasks.
Ticket strips were limited to hours credit for PSS deployment. Credits are a flexible retainer that can be used for many more help and services, including different levels of support.
The current hours on your ticket strip will be converted into credits with a 15% bonus as a gift from us.
The transition moment has been set for August 1st. In the week of August 9th, you will receive your new credits, in addition to a final overview of your old credits.
Use of Credits
The new credits have a validity of 24 months. The term will not change for existing credits.
Credits can be used for all ON2IT services, including CSIRT, Virtual CISO, NIS2 gap analysis, security health checks, architecture designs, and support for infrastructure challenges
Each task includes a Statement of Work (SOW) in which we show in advance how many credits it costs, or how many credits per hour it costs based on an effort obligation.
You have direct access to senior security architects through our mail address, without having to navigate through your organization’s purchasing process. You can, using your credit, send an email to creditquestions@on2it.net with your request.
Bonus & Value
As a gift, you will receive a bonus of 15% extra credits when your credit hours are converted into credits.
Use the credits for a wide range of services that ON2IT offers to take full advantage of the added bonus. Check the suggested task list to see what suits you best at the moment.
Practical aspects and rules
Contact ON2IT (creditquestions@on2it.net) to purchase new credits or to discuss which services you can still receive.
Yes, you will receive an update of your credit every month, including any changes in that month.
Yes, credits are not a substitute for services. What we mean by this, is that using your credits for services listed on this page does not automatically equal having instant access to our 24/7 SOC and CSIRT services. That being said, we will always try to respond to requests as quickly as possible.
Let us know! We are open to suggestions and may be able to offer customized solutions.
This can be done in consultation.
Please contact us by reaching out to your service delivery manager at ON2IT or send an email to creditquestions@on2it.net.
If you want to buy credits, a quotation will be made by our sales department. The amount will then be charged in one lump sum and your credit will be debited.
Every month you will receive an overview of your credit. Any credit used for that month will be explained therein.