Skip to content

 Main Street Project 

 Cybersecurity Plans for American Businesses 

Cybersecurity plans designed for community businesses

Main Street America’s community businesses have long been underserved in the cybersecurity industry, even though they face the same threat as large corporations. Difficulty in finding qualified cybersecurity talent is difficult everywhere, but even more difficult in smaller and mid-sized communities, but the threat actors don't care. Blue Team Alpha believes that America’s community businesses deserve the same level of cybersecurity as large corporations and need help spreading the word. which is why we started the Main Street Project. We also believe that the best resources to help protect community businesses, are members of the community. Blue Team Alpha's Main Street Project Ambassador Program enables members of the community to connect them with a team of leading cybersecurity experts to protect community businesses from global cyber threats.

Community Business Focused

A cybersecurity program designed so you can focus on running your business.

Low Monthly Payments 

The same services used by global corporations at accessible prices for every business.

24/7/365 Emergency Support

Rest assured knowing that no matter when you call, someone will answer and be ready to help.

Plans & Pricing

The Main Street Project provides cybersecurity services in bundles. Each bundle comes with a compromise assessment, external vulnerability scan, annual phishing test, and a team on standby to investigate any suspicious activity*. 

Endpoint Detection & Response and Managed Detection & Response can be added to each plan at a set price per endpoint. 

 

*additional charges may apply depending on the severity of suspicious activity and time it takes to remediate

Main Street  Landing Page Hero 2

Tier 1

$300/month

Includes 12 hours per year that can be used for:
  • Incident Response
  • Email Hardening

  • Email Phishing Campaign

Tier 2

$600/month

Includes 24 hours per year that can be used for:
  • Incident Response
  • Email Hardening

  • Email Phishing Campaign
  • Ransomware Architecture Review

Tier 3

$900/month

Includes 36 hours per year that can be used for:
  • Incident Response
  • Email Hardening
  • Email Phishing Campaign
  • Ransomware Architecture Review
  • External Vulnerability Scan

Tier 4

$1,200/month

Includes 48 hours per year that can be used for:
  • Incident Response
  • Email Hardening
  • Email Phishing Campaign
  • Ransomware Architecture Review
  • External Vulnerability Scan
  • vCISO Strategic Planning

Penetration Test

$1,500/month

Includes 60 hours per year that can be used for:
  • Incident Response
  • Web App Penetration Testing
  • External Penetration Testing
  • Internal Penetration Testing

vCISO 

$1,800/month

Includes 72 hours per year that can be used for:
  • Incident Response
  • Ransomware Table Top Exercise
  • vCISO Strategic Planning
  • vCISO Policy Development

Ransomware Bundle

$2,400/month

Some key features
  • Incident Response
  • Email Hardening
  • Ransomware Table Top Exercise
  • Email Phishing Campaign
  • Ransomware Architecture Review
  • External Vulnerability Scan
  • Web App Penetration Testing
  • External Penetration Testing
  • Internal Penetration Testing

Full Cybersecurity Program

$3,000/month

Includes 120 hours per year that can be used for:
  • Incident Response
  • Email Hardening
  • Ransomware Table Top Exercise
  • Email Phishing Campaign
  • Ransomware Architecture Review
  • External Vulnerability Scan
  • Web App Penetration Testing
  • External Penetration Testing
  • Internal Penetration Testing
  • vCISO Policy Development
9.83 (3)
"Your team was wonderful! Every step of the way I knew we were in good hands. I want to thank everyone for all the work and long hours. It was a true pleasure to work with all of you."

   

All plans include

  • Proactive Cybersecurity Services

    To protect your business and defend against cyber threats.

  • Incident Response Hours

    Should a threat actor attack your network, each plan comes with the option of incident response hours to expedite recovery from an attack.

  • A Team of Leading Cybersecurity Experts

    • Certified Incident Handlers, Penetration Testers, & Infosec Professionals
    • Experience working with Government Security Agencies​
    • Former Chief Security Officers and Chief Information Security Officers​
    • Former and Current Information System & Intelligence or Military Personnel ​
    • Department of Defense Prime Contractor CISOs and Analysts
Main Street Landing Page Images

Every business should have a cybersecurity plan. 

Learn what cyber threats businesses of all sizes are facing. 

Service Descriptions

Main Street  Landing Page Hero 3

Incident Response

We rapidly assess the situation and deploy the best countermeasures to minimize the damage. Your own fully certified, full-service, round-the-clock team to get you back up and running, fast.

Email Hardening

A process intended to eliminate a means of attack by patching vulnerabilities and turning off nonessential services.

Ransomware Tabletop Exercise

Cyber attack preparation for all levels of your team so everyone is prepared for a possible incident.

Email Phishing Campaign

A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.

Compromise Assessment

Assesses your environment for Indicators of Compromise, helping to answer the question: “Is an attacker in my environment?”

External Vulnerability Scan

Network and application scan to identify vulnerabilities.

vCISO Strategic Planning

Virtual CISO services help executives, security and technology teams safeguard information assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance overall security posture.

Web App Pen Test

Web application vulnerability testing on Client web-based applications. Identifications and exploitation of vulnerabilities and gain access to confidential system resources by emulating a real-world attack. Testing is non-destructive and covert.

Ransomware Readiness Review

Assessment to determine how ready you are to prevent and defend against a ransomware attack.

External Pen Test

Active and passive security scans of your IT environment to uncover weaknesses and rate the severity of the discovered vulnerabilities. Attempts to exploit the vulnerabilities, escalate privileges, pivot to new assets, and take complete control of your environment.

Internal Pen Test

Discover internal subnet(s) and services. Perform passive and/or active vulnerability scanning of the production environment subnet(s) to identify vulnerabilities. These scans are designed to find access control and system configuration issues that can be exploited. Attempt to exploit the discovered vulnerabilities, gain access to internal assets, and simulate the removal of information.

vCISO Policy Development

Create a common risk language for consistent and actionable risk measurement models. Risk can live in silo and it affects every part of a business. This needs to be communicated and embraced by all for a risk-aware culture.

Endpoint Detection and Response (EDR)

Provides advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.

Managed Detection and Response (MDR)

An outsourced cybersecurity service designed to protect your data and assets even if a threat eludes common organizational security controls.

Frequently asked questions

How do I know what bundle is right for my organization?

Not sure what bundle best fits the needs of your organization? Not a problem. Give us a call - 612-888-9674.

We would be happy to talk through your unique cybersecurity challenges and identify the bundle that best fits your needs.

What certifications does Blue Team Alpha have?

Certified Information Systems Security Professional (CISSP) 

  • Offensive Security Certified Professional (OSCP)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Network Forensic Analyst (GNFA)
  • GIAC Continuous Monitoring Certification (GMON)
  • GIAC Certified Incident Handler (GCIH)
  • Sourcefire Certified Administrator (SFCA)
  • GIAC Certified Intrusion Analyst (GCIA)
  • Information Technology Infrastructure Library (ITIL)
  • CompTIA Security+
  • CompTIA Network+
  • CompTIA A+
  • CompTIA Linux+
  • CompTIA Project+
  • CIW JavaScript Specialist​
  •  CIW Web Design Specialist​
  •  CIW Web Foundations Associate​
  •  EC-Council Certified Ethical Hacker
  • EC-Council Certified Hacking Forensic Investigator​
  • Microsoft Certified Systems Engineer (MCSE)​
  • Microsoft Certified Professional (MCP)
  • Silver Peak SDWAN eXpert (SPSX)
  • Versa Networks Secure SDWAN Provisioning​
  • Double-Take NSI Certified​
  • eJPT​
  • CWNA® - Certified Wireless Network Administrator​
  • CWSP® - Certified Wireless Security Professional​
  • CWNP® - Certified Wireless Network Professional​
  • Lucent WaveLAN Wireless Certification ​

Still have questions? Give us a call or send an email, we would be happy to answer all of your questions. 

Phone: 612-888-9674 | Email: info@blueteamalpha.com

 

Project Commitment and Goals