Packages & Pricing

Clear, predictable pricing built for modern teams. All plans are billed per user / month, with a defined device limit so coverage stays consistent as you grow.

Device limits: Core (2/user), Pro (3/user), Elite (4/user). Extra devices: $25 / device / month.

All services are delivered remotely. On-site support is not provided.

Core

Foundation Protection
Price $175 / user / month
Up to 2 devices per user · Extra devices: $25 / device / month
Includes
  • Email security and phishing protection
  • Endpoint protection and monitoring
  • Identity exposure and dark web monitoring
  • External footprint scanning
  • Security awareness training
  • Patch management coordination
  • Remote support and ticketing
Why Core

Core provides the baseline controls most businesses need to reduce common risks. It focuses on prevention, visibility, and reliable remote support—without advanced response workflows.

Pro

Advanced Protection
Price $295 / user / month
Up to 3 devices per user · Extra devices: $25 / device / month
Everything in Core, plus
  • Identity Threat Detection & Response (ITDR)
  • Enhanced endpoint detection capabilities
  • Cloud data protection monitoring
  • Phishing simulations and targeted training
  • Security automation and remediation playbooks
  • Advanced monitoring and operational workflows
Why Pro

Pro adds layered detection and automation on top of Core. It’s ideal for teams that want tighter identity controls, improved insight into threats, and faster resolution—without full incident response leadership.

Elite

Response Leadership
Price $475 / user / month
Up to 4 devices per user · Extra devices: $25 / device / month
Everything in Pro, plus
  • Advanced threat alerts and security signals
  • Incident triage and escalation coordination
  • Coordinated incident response support
  • Response actions executed through supported platforms
  • Executive-level risk reporting
  • Quarterly security roadmap and recommendations
Why Elite

Elite is about leadership during security events. Response actions, communication, and reporting are coordinated so your team isn’t navigating incidents alone—while keeping scope clear and predictable.

Optional Services

Optional Services can be added to any package to enhance coverage based on your environment and goals.

Security Enhancements
Strengthen protection and reduce human-factor risk.
  • Advanced phishing simulations $15–$25 / user / month
  • Identity hardening & MFA enforcement $500–$1,500 (one-time)
  • Cloud security review (Microsoft 365 / Google Workspace) $750–$2,000
  • External attack surface review $500–$1,500
IT & Operations
Improve visibility, consistency, and device operations.
  • Advanced monitoring profiles $250–$750
  • Patch strategy & maintenance coordination $10–$20 / device / month
  • Device lifecycle management $5–$15 / device / month
  • Operational workflow tuning $250–$1,000
Risk & Advisory
Documentation, reporting, and readiness support.
  • Executive security reporting $500–$1,500 / quarter
  • Cyber insurance readiness review $750–$2,500
  • Security policy & documentation pack $1,000–$3,000
  • Risk register & remediation plan $750–$2,000

How Optional Services pricing is calculated

Optional Services are priced based on scope and effort. Final pricing is confirmed after a brief review of your environment.

Environment size
Number of users, devices, and business-critical systems involved.
Complexity
Number of domains/tenants, integrations, locations, and existing configurations.
Current maturity
How much is already configured vs. what must be built, enforced, and validated.
One-time vs. recurring
Project-based work is one-time; monitoring/maintenance is typically monthly or quarterly.
Urgency & timelines
Expedited delivery or fixed deadlines can increase effort and scheduling requirements.
Documentation requirements
Level of written policies, evidence packages, and reporting depth required.

For clarity and alignment, scope and pricing are documented before work begins.

Servers & Shared Systems

Servers and shared systems are scoped separately because they require additional monitoring, patching, and operational care beyond individual user devices. During the Security Assessment, we review all servers and shared systems and confirm what support is required—so pricing and expectations are clear before onboarding.

Pricing FAQ

How does per-user pricing work?
Each user is covered under a single monthly rate that includes services up to the device limit for the selected plan.
What counts as a device?
Laptops, desktops, and workstations count as devices. Other device types may be included depending on the environment and configuration.
What if a user has more devices than the plan allows?
Additional devices are billed at a flat monthly rate per device. Device counts are confirmed during onboarding.
Do I need a Security Assessment first?
Yes. The Security Assessment confirms users, devices, risk areas, and ensures the right package and scope are selected.
Are contracts required?
Plans are typically billed monthly. Longer-term agreements can be offered based on client preference.
Is on-site support included?
No. Services are delivered remotely.

Services are designed to reduce risk and improve readiness. No solution can guarantee prevention of all security incidents.

Why SIMAFORCE

SIMAFORCE is built for businesses that want real protection without unnecessary complexity. We combine remote-managed operations with practical security controls—delivered with clear pricing, accountable coordination, and a focus on reducing real-world risk.

SIMAFORCE

Protect Your Business. Keep Work Moving.

We keep your email, devices, and accounts protected—so phishing, ransomware, and outages don’t turn into downtime, lost revenue, or stressful surprises.

Clear scope. Predictable pricing. A team that responds when something looks wrong.

Built for law, healthcare, and professional services.

People working on computers in an office
Monitoring & response workflows
Team collaborating on cybersecurity tasks
Security + IT aligned
People working on laptops and computers
Practical protection for real teams
Fewer surprises
Reduce the everyday risks that cause urgent “all-hands” moments.
Less downtime
Keep systems available with prevention and fast response.
Clear next steps
Start with an assessment and get a practical plan—no guesswork.

You shouldn’t have to think about security every day.

You’re running a business. We help you reduce risk, keep your team productive, and avoid the “we didn’t see it coming” moments— with a simple setup and ongoing support.

A clear starting point Protection across the basics A team you can reach Help when something happens

We’ll review your environment and recommend the best next step—based on your actual risks and workflow.

How it works

A straightforward process that gets you protected quickly—without slowing the business down.

1
Review
We assess your current setup and what matters most to your operations.
2
Prioritize
You get clear next steps focused on the biggest risks—not a long report.
3
Protect
We implement protections and stay with you—monitoring and responding as needed.