Skip to main content
  • x-twitter
  • facebook
  • linkedin
  • google-plus
  • phone
  • email
Under attack or recently suffered a cyber breach? Contact us now for immediate expert help
  • Client Portal
CSIQ
search
Menu
  • Cyber Intelligence
    • Attack Surface Review
    • Cyber Investigation
  • Incident Response
  • Compliance & Governance
    • Cyber Essentials
    • IASME Cyber Assurance
  • Cyber Consultancy Services
    • Adversary Emulation
    • Cyber Security Review
    • Cyber Strategy
    • Penetration Testing
    • Web Application Penetration Testing
    • Active Directory & Azure AD Review
    • Remote Desktop & Citrix Review
  • Managed Cyber Security
    • Attack Surface Management
    • Managed Email Security
    • Managed Backup & BCDR
    • Managed Firewalls
  • Company
    • About CSIQ
    • Blog
    • Pre-Pay Contract
    • Working with MSPs
    • Careers
    • Contact Us
  • Get A Rapid Quote
  • search
Close Search

Get a bespoke and rapid quote

"*" indicates required fields

1Start
2Cyber Intelligence
3Attack Surface Review
4Incident Response
5Compliance & Governance
6Cyber Assurance
7Cyber Essentials
8Cyber Essentials Plus
9Cyber Consulting
10Endpoint & Technology Reviews
11Penetration Testing
12Adversary Emulation
13Cyber Review
14Managed Cyber Security
15Managed Attack Surface
16Managed Email Security
17Managed Backup & DR
18Your Details
This field is for validation purposes and should be left unchanged.
Start*

Welcome to the online quote request tool...


If you are looking for a quotation for one of our services, please complete our online quoting form with options that best represent your requirements and contact details.

Depending on your needs, we will be in touch with a quote instantly or contact you directly for more information.

Cyber Intelligence


Our intelligence and investigation services can be used to facilitate legal investigations, as we have the qualifications and expertise to stand up as expert witnesses in our specialist fields.

Incident Response


Our incident response professionals are ready to aid as soon as possible, with the technology to support remote and on-site investigations.

Compliance & Governance


Our certified assessors for Cyber Essentials, Cyber Essentials Plus and IASME Cyber Assurance have the experience and qualifications to guide and assist you through any IASME compliance standards.

Cyber Consultancy


Our consultancy engagements are run with a project manager, and progress is tracked throughout our client portal and risk management platform. We also offer a pre-paid support contract that can be used to consume any of our consultancy services, making these services accessible to any business regardless of size.

Managed Cyber Security


Our managed cyber security services bring together a suite of security products designed to integrate into any small or medium business. They are made to protect against the most prominent cyber threats seen today.

Our flexible Pre-pay Contract


Benefit from 25% off and rapid response with our Pre-Pay Contract.

Cyber Intelligence

Attack Surface Review


Our reports and active monitoring provide you with knowledge of potential attackers, allowing you to focus on risk prevention and effectively train defensive teams and staff.

Attack Surface Review*

Attack Surface Review


Our reports and active monitoring provide knowledge of potential attackers, allowing you to focus on risk prevention and effectively train defensive teams and staff.

Attack Surface Review

Active


A value and threat-informed vulnerability assessment against your organisation that captures human and technological risks. A signed vulnerability scoping agreement is required.

Attack Surface Review

Passive


A passive review of an organisation's technical and human exposure.

Incident Response*

Cyber Breach Review


Triage or review a cyber security incident with CSIQ’s Crest accredited team of consultants

Compliance & Governance*

Compliance and Governance


Demonstrate to stake holders and customers that you are protecting their data with an NCSC backed certification.

Cyber Essentials


The NCSC approved recommended minimum standard for organisations across the UK.

Cyber Essentials Plus


Technical validation of the Cyber Essential Technical Controls.

IASME Cyber Assurance


Builds on Cyber Essentials by implementing the NCSC 10 steps to Cyber Security

IASME Cyber Assurance

IAMSE Cyber Assurance


IASME Cyber Assurance has critical security components such as incident response, employee training, planning, and operations. IASME Cyber Assurance also includes a Cyber Essentials examination and a review of the General Data Protection Regulation (GDPR).

IAMSE Cyber Assurance

Self Assessment


For businesses with a strong understanding of information security.

IAMSE Cyber Assurance

Guided


For Businesses that are committed to achieving the IASME Cyber Assurance Level 1 standard and do not have the technical skills in-house.

IAMSE Cyber Assurance

Audited


For businesses with an undeveloped information security program.

Please enter a number greater than or equal to 1.
Cyber Essentials*

Cyber Essentials

Basic


As a Cyber essential certification body, we offer a tailored and guided approach to Cyber Essentials, ensuring that you meet the requirements for certification while being supported throughout the process.

Cyber Essentials Basic

Self Assessment


Choose a self assessed Cyber Essentials plan with first time pass and same day certification.

Cyber Essentials Basic

Guided


Choose our guided Cyber Essentials plan with first time pass and same day certification, and gap analysis.

Cyber Essentials Basic

Managed


Choose our manded plans, with all the benefits of a self assessed plan, managed by us.

Endpoints are defined as Workstations, Laptops, Tablets, and Servers.
Cyber Essentials Plus*

Cyber Essentials

Plus


The Cyber Essentials Plus certification maintains the same strategy as Cyber Essentials, and the defences you must implement are the same. However, Cyber Essentials Plus includes a hands-on technical verification, making it an even more thorough and effective certification against cyberattacks.

Cyber Essentials Plus

Audit & Certification


Our cyber essentials plus audit and certification plan comes with a first time pass, audit and pre-audit, for businesses that want to quickly attain certification and don’t have access to in-house security professionals.

Cyber Essentials Plus

Guided + Audit & Certification


Our cyber essentials plus audit and certification plan comes with a first time pass, and umlimited guidance, for businesses that want to quickly attain certification and don’t have access to in-house security professionals.

Cyber Essentials Plus

Managed


Our cyber essentials plus audit and certification plan comes with a first time pass, and umlimited guidance, for businesses that want to quickly attain certification and don’t have access to in-house security professionals.

Endpoints are defined as Workstations, Laptops, Tablets, and Servers.
Please enter a number greater than or equal to 1.
Cyber Consultancy*

Cyber Consultancy


Our consultancy engagements are run with a project manager, and progress is tracked throughout our client portal and risk management platform. We also offer a pre-paid support contract that can be used to consume any of our consultancy services, making these services accessible to any business regardless of size.

Endpoint & Technology Reviews


Our endpoint and technology reviews help identifiy weaknesses in your security network.

Penetration Testing


We offer comprehensive penetration testing services in the United Kingdom, with our experienced team offering invaluable advice on how you can improve your organisation’s security posture.

Adversary Emulation


Protect your most critical assets from cyber-attacks with our threat informed adversary emulation. By letting us simulate real-world offensive scenarios, we can test your existing security, including the human element, often the first line of defence.

Cyber Review


Our Cyber review provides the full scope of IT systems in place at most organisations today. We will develop your company’s IT security stance and provide Cyber risk management strategies to help your business face today’s cyber security threats.

Endpoint & Technology Reviews*

Endpoint Technology Reviews


Our endpoint and technology reviews help identify weaknesses in your security network.

Workstation Security Review


We assess your endpoints against best practices that protect your organisation from the latest attacks used to gain access to your organisation’s data.

Active Directory & Azure AD Review


Our Azure AD security management advice helps prevent Cyber attackers from gaining access to your business network and highlights any issues and weaknesses preventing you from the best security possible.

Remote Desktop & Citrix Review


Security issues are inevitable with remote working solutions becoming increasingly important in today’s modern world. Remote Desktop and Citrix Solutions are fantastic business enablers allowing secure remote access to company data from anywhere.

Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Penetration Testing*

Penetration Testing


We offer comprehensive penetration testing services throughout the United Kingdom, with our experienced team offering invaluable advice on how you can improve your organisation’s security posture.

External Network penetration Test


We will detect vulnerabilities, identify configuration weaknesses, laterally move, and escalate privileges to deliver a comprehensive understanding of your corporate network’s security posture.

Internal Infrastructure Penetration Test


An Infrastructure Penetration test is used to validate security controls and assess the impact of an account compromise or an insider threat.

Web Application Penetration Test


Web Application penetration testing is an authorised security test on a web application to identify vulnerabilities within your network that can be exploited. Web applications are a common target for hackers and can be challenging to keep secure.

Company Website Penetration Test


Your company website is often the first point of contact with a new lead. It is essential to ensure your site is protected from defacement and reputational damage.

Physical Penetration Test


Physical penetration testing is a live demonstration of a technical attack against an organisation’s physical defences and access control processes. Our testing will allow you to evaluate your ability to detect an adversary and identify areas for improvement in detection capabilities and processes.

Wireless Network Penetration Test


Misconfigured wireless networks pose a serious risk to the data of the organisation. If attackers gain access to the Staff wireless network, they often have access to the same servers and resources as a user cabled into a wall, which might result in data loss.

Social Engineering Test


The social engineering testing services enable you to assess staff detection and response capabilities accurately and provide risk remediation and training strategies.

Microsoft 365 Penetration Test


Microsoft 365 and Google’s G-Suite are unified workplace solutions for individuals, teams and businesses. As these solutions enjoy rapid development with the introduction of new features, securing the platforms has become increasingly challenging, with a single compromised account often resulting in data loss and further attacks on customers and partner organisations.

Cloud Infrastructure Penetration Test


We comprehensively assess cloud productivity tools to ensure they are configured securely.

ISO 27001 Penetration Test


Through our testing, we will ensure that you capture the risks relevant to the context of your organisation and provide the results in a format that will integrate with your existing risk assessment and risk treatment plans.

Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 0.
Most organisations have only one tenant. Some companies will split their users across multiple tenants due to time zones or specific support requirements.
Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 1.
Adversary Emulation*

Adversary Emulation


Protect your most critical assets from cyber-attacks with our threat-informed adversary emulation. By letting us simulate real-world offensive scenarios, we can test your existing security, including the human element, often the first line of defence.

Adversary Emulation


Protect your most critical assets from cyber-attacks with our threat-informed adversary emulation. We will emulate threat actors with the intent and resources to achieve their objective and test your security controls to the limit.

Red Team Assessment


An objective-based penetration test that assesses your organisation's capabilities to detect and protect against a persistent threat actor.

Purple Team Assessment


Our purple team engagements will test your ability to detect and respond to the tactics of an advanced persistent threat actor. We will work with your defensive teams to identify critical indicators of compromise and integrate low-noise monitoring.

Cyber Review*

Cyber Review


Our Cyber review provides the full scope of IT systems at most organisations today. We will develop your company’s IT security stance and provide Cyber risk management strategies to help your business face today’s cyber security threats.

Cyber Review Core


Our Core review will help you understand what’s critical in enabling your business to operate securely.

Cyber Review Strategic


Comprehensively and strategically understand your organisation’s cyber security position.

Please enter a number greater than or equal to 1.
Managed Cyber Security*

Managed Cyber Security


Our managed cyber security services bring together a suite of security products designed to integrate into any small or medium business. They are made to protect against the most prominent cyber threats seen today.

Managed Attack Surface


Gain enterprise-grade threat intelligence and protection by monitoring your organisation’s attack surface with CSIQ’s team of Crest accredited threat hunters.

Managed Email Security PhishIQ


phishIQ is our managed email security solution, combining staff training, cyber threat intelligence, and support to help your staff make informed decisions about cyber security.

Managed Backup & DR ProtectIQ


ProtectIQ is a managed backup and disaster recovery service, offering recovery solutions that will eliminate these risks by providing continuous protection against ransomware attacks, accidental deletion of files and adherence to compliance and regulatory standards like ISO 22301, 270001, PCI-DSS, and GDPR.

Managed Firewalls PerimeterIQ


PerimeterIQ provides businesses with state-of-the-art security services, no matter the size. Our solutions help you prepare and defend against the latest cyber threats and reduce the administrative burden by providing everything in one managed service.

Managed Attack Surface*

Managed Attack Surface


Gain enterprise-grade threat intelligence and protection by monitoring your organisation’s attack surface with CSIQ’s team of Crest accredited threat hunters.

Managed Attack Surface

Essentials


Gain enterprise-grade threat intelligence and protection by monitoring your organisation’s attack surface, which is essential for any business.

Managed Attack Surface

Control


Protects small/medium businesses within the UK from the increasing risk of Cyber Attacks by providing access to qualified security professionals.

Managed Attack Surface

Vigilance


Threat intelligence and protection for enterprises and risk-averse SMEs.

Please enter a number greater than or equal to 1.
Please enter a number greater than or equal to 0.
Please enter a number greater than or equal to 0.
Optional
Managed Email Security*

Managed Email Security

phishIQ


phishIQ is our managed email security solution, combining staff training, cyber threat intelligence, and support to help your staff make informed decisions about cyber security.

Managed Email Security

Essentials


We integrate with well-known platforms such as Microsoft 365, On-premises Exchange and G-Suite to proactively protect your employees from malicious attacks delivered by email, which is best for SMEs and start-up companies.

Managed Email Security

Control


We integrate with well-known platforms such as Microsoft 365, On-premises Exchange and G-Suite to proactively protect your employees from malicious attacks delivered by email, best for scaleups & risk-averse SMEs.

Managed Email Security

Vigilance


We integrate with well-known platforms such as Microsoft 365, On-premises Exchange and G-Suite to proactively protect your employees from malicious attacks delivered by email, best for legal entities with high data retention requirements.

Please enter a number greater than or equal to 1.
Managed Backup & DR*

Managed Backup & DR ProtectIQ


Protect your business from accidental deletion and cyber-attacks with pay monthly consumption-based licensing model.

Infrastructure


Protect your critical infrastructure from accidental deletion and cyber-attacks with pay monthly consumption-based licensing model.

Infrastructure + DR


Protect your critical infrastructure and benefit from the rapid recovery should the worst happen with a consumption-based per GB licensing model.

SaaS (M365)


Protect your business from accidental deletion and benefit from rapid restores with CSIQ cloud-based SaaS protection services.

Please enter a number greater than or equal to 1.

Your Details

Your Details


Please fill in the rest of your details and any further comments.

An email confirmation will be sent with additional details and we will be in touch.

We look forward to speaking with you soon!

Name*
This field is hidden when viewing the form
CSIQ-Logo-White

© 2025 CSIQ Limited. All rights reserved.

Company No. 12741949

ICO Registration No. ZA935612

Assess

  • Cyber Intelligence
  • Cyber Consultancy Services
  • Adversary Emulation
  • Cyber Security Review

Protect

  • Attack Surface Management
  • Managed Email Security
  • Managed Backup & BCDR
  • Managed Firewalls

Respond

  • Incident Response

Assure

  • Cyber Essentials
  • IASME Cyber Assurance

Company

  • About CSIQ
  • Pre-Pay Contract
  • Working with MSPs
  • Careers with CSIQ
  • Contact Us

Legal

  • Website Terms of Usage
  • Standard Terms of Service
  • Company Policies
  • A.I Responsibility Statement
  • Privacy Policy
  • Cookie Policy

Contact

  • [email protected] (PGP/GPG Key: 0x27CC3B9B)
  • 03300 430 900
  • CSIQ Limited, Stansted Park, Rowlands Castle, Hampshire, PO9 6DX
Close Menu
Under attack or recently suffered a cyber breach? Contact us now for immediate expert help
  • Cyber Intelligence
    • Attack Surface Review
    • Cyber Investigation
  • Incident Response
  • Compliance & Governance
    • Cyber Essentials
    • IASME Cyber Assurance
  • Cyber Consultancy Services
    • Adversary Emulation
    • Cyber Security Review
    • Cyber Strategy
    • Penetration Testing
    • Web Application Penetration Testing
    • Active Directory & Azure AD Review
    • Remote Desktop & Citrix Review
  • Managed Cyber Security
    • Attack Surface Management
    • Managed Email Security
    • Managed Backup & BCDR
    • Managed Firewalls
  • Company
    • About CSIQ
    • Blog
    • Pre-Pay Contract
    • Working with MSPs
    • Careers
    • Contact Us
  • Get A Rapid Quote
  • Client Portal
  • x-twitter
  • facebook
  • linkedin
  • google-plus
  • phone
  • email
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie Settings Accept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies categorised as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyse and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
PHPSESSIDsessionThis cookie is native to PHP applications. The cookie is used to store and identify a users' unique session ID for the purpose of managing user session on the website. The cookie is a session cookies and is deleted when all the browser windows are closed.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo