The right engagement model for your team.
Not every organization wants to run their own tests. Some want full control, others want hands-off expertise. We offer both, and everything in between.
Self-Service
Full control, your schedule.
Your security team runs tests through the web UI or API. Configure attack profiles, schedule recurring simulations, monitor results in real time, and download audit-ready reports, all without waiting on anyone else.
- Launch tests on demand: configure and run from the dashboard or via the API
- Real-time dashboards: watch attack-side and target-side metrics as the test runs
- Automated reports: generated on every test completion with compliance mapping
- Pay-per-unit: purchase attack units at your tier, use them on your schedule
Best for teams that…
- • Have in-house security expertise
- • Want to test frequently and on their own schedule
- • Need API access for CI/CD integration
- • Prefer full control over test configuration
What's included
- • Dedicated account manager who knows your infrastructure
- • Custom test plan designed for your mitigation stack
- • We execute all tests. Your team reviews results, not configs
- • Actionable remediation guidance, not just raw findings
- • Quarterly security posture reviews
Managed Testing
Expert-led, hands-off.
Our team designs the test plan, executes it, analyzes the results, and delivers a full report with prioritized remediation guidance. You get the answers without managing the tooling.
We'll tell you which tests actually matter for your specific architecture, not just throw volume at your infrastructure and call it a day.
Consulting & Advisory
Beyond testing: architecture and strategy.
Sometimes the gap isn't in your defenses. It's in how they're configured. Our consulting engagements go beyond simulation to help you design, evaluate, and optimize your security architecture.
Mitigation Review
Deep-dive analysis of your DDoS mitigation configuration, threshold tuning, and failover behavior.
Vendor Evaluation
Independent comparison of DDoS mitigation vendors against your specific traffic profile and risk tolerance.
Tabletop Exercises
Facilitated incident response exercises focused on DDoS scenarios. Test your processes, not just your infrastructure.
Configuration Audit
Comprehensive audit of WAF rules, rate limits, geo-blocking, origin shielding, and protocol filtering.
Continuous Testing
Track your posture over time.
One-off tests are a snapshot. Continuous testing programs give you a trend line. Schedule recurring simulations (weekly, monthly, or quarterly) and track how your mitigation posture evolves across configuration changes, vendor switches, and infrastructure updates.
Scheduled Runs
Cron-style scheduling for recurring tests. Same config, consistent baseline, automatic execution.
Trend Reports
Side-by-side comparison across test runs. See improvement, regression, or configuration drift at a glance.
Change Alerts
Get notified when results deviate from baseline. Catch regressions before attackers do.
Compare
Which model fits your organization?
| Self-Service | Managed | Consulting | |
|---|---|---|---|
| Who runs the tests | Your team | Our team | Our team |
| Test design | You choose | We recommend | Custom program |
| Platform access | Full | Full | Full |
| Remediation guidance | Automated | Expert analysis | Deep-dive review |
| Account manager | - | Dedicated | Dedicated |
| Billing | Per-unit purchase | Annual contract | Statement of Work |
Not sure which model fits?
Talk to us about your organization's security testing needs. We'll help you figure out the right engagement model.