{"id":22,"date":"2025-09-21T20:35:43","date_gmt":"2025-09-21T20:35:43","guid":{"rendered":"https:\/\/bpd.hr\/?page_id=22"},"modified":"2025-09-21T20:35:43","modified_gmt":"2025-09-21T20:35:43","slug":"pricing","status":"publish","type":"page","link":"https:\/\/bpd.hr\/index.php\/pricing\/","title":{"rendered":"Pricing"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Flexible Pricing for Your Security Needs&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;5c84a534-b27f-4309-8fe2-678178d22489&#8243; title_text_color=&#8221;#FFFFFF&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;3b9804fe-f121-4ac1-9c7f-239b999f317e&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;]Choose a plan that fits your business, with scalable cybersecurity solutions designed to protect and empower.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_pricing_tables _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;7f2ec2b7-3178-4906-90d8-cbcee7b0522c&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_pricing_table title=&#8221;Essential&#8221; subtitle=&#8221;Starter Security&#8221; currency=&#8221;$&#8221; per=&#8221;mo&#8221; sum=&#8221;99&#8243; button_url=&#8221;#&#8221; button_text=&#8221;Buy Now&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;]+ Firewall Protection<br \/>\n+Daily Threat Scans<br \/>\n+ Email Security Basics<br \/>\n+Standard Support Access<br \/>\n+ Monthly Risk Summary[\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_pricing_tables _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;7f2ec2b7-3178-4906-90d8-cbcee7b0522c&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_pricing_table featured=&#8221;on&#8221; title=&#8221;Pro&#8221; subtitle=&#8221;Advanced Defense&#8221; currency=&#8221;$&#8221; per=&#8221;mo&#8221; sum=&#8221;299&#8243; button_url=&#8221;#&#8221; button_text=&#8221;Buy Now&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;]<\/p>\n<p>+ All Essential Features<br \/>+ Device Endpoint Shield<br \/>+ Priority Expert Support<br \/>+ Secure VPN Access<br \/>+ Cloud Data Protection<br \/>+ Weekly Reports<\/p>\n<p>[\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_pricing_tables _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;7f2ec2b7-3178-4906-90d8-cbcee7b0522c&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_pricing_table title=&#8221;Enterprise&#8221; subtitle=&#8221;Complete Protection&#8221; currency=&#8221;$&#8221; per=&#8221;mo&#8221; sum=&#8221;499&#8243; button_url=&#8221;#&#8221; button_text=&#8221;Buy Now&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;]+ All Pro Features<br \/>\n+ AI-Powered Threat Hunting<br \/>\n+ Dedicated Security Advisor<br \/>\n+ Custom System Integration<br \/>\n+ Instant Incident Response<br \/>\n+ Compliance Audit Tools[\/et_pb_pricing_table][\/et_pb_pricing_tables][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Call to Action&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;8b4e8cd6-2a18-450e-882f-a8901b3dbbe8&#8243; background_image=&#8221;https:\/\/bpd.hr\/wp-content\/uploads\/2025\/09\/cyber-security-backgrounds-02@2x.png&#8221; custom_padding=&#8221;8vw|60px|8vw|60px|true|true&#8221; custom_padding_tablet=&#8221;8vw|30px|8vw|30px|true|true&#8221; custom_padding_phone=&#8221;8vw|20px|8vw|20px|true|true&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_color_all=&#8221;gcid-primary-color&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-primary-color%22:%91%22border_color_all%22%93}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;e2305241-b062-4fef-aeb7-d47fcd1f692d&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;Accelerate Your Cybersecurity Strategy&#8221; button_url=&#8221;#&#8221; button_text=&#8221;Optimize Security&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;023fb9e5-13a2-451e-9dd1-a453d4c550dd&#8221; max_width=&#8221;900px&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Enhance your security posture with enterprise-grade solutions backed by expert analysis and industry-leading technology. Stay ahead of cybercriminals with a proactive approach to risk mitigation.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;FAQ&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_accordion _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;b7fb4c5e-3fee-402a-8e39-39bc472bf00d&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;How Does AI Enhance Threat Detection?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;]Our AI-powered threat detection analyzes vast amounts of data in real-time, identifying subtle anomalies and patterns that traditional methods might miss. This allows for faster and more accurate identification of potential threats, enabling proactive defense and minimizing risks.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What types of threats can your services protect against?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;]Our comprehensive cybersecurity services are designed to protect against a wide range of threats, including malware, ransomware, phishing attacks, denial-of-service attacks, insider threats, and advanced persistent threats (APTs). We employ a multi-layered approach combining cutting-edge technologies and expert analysis to ensure robust defense.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How proactive is your approach to cybersecurity?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;]We believe in a proactive security posture. Our services include continuous monitoring, vulnerability assessments, penetration testing, and threat intelligence analysis to identify and mitigate potential risks before they can impact your organization. We stay ahead of emerging threats to keep your defenses strong.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Can your services help with data breach prevention?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;]Absolutely. Preventing data breaches is a top priority. Our services incorporate robust security controls, data loss prevention (DLP) strategies, encryption techniques, and employee training to minimize the risk of sensitive information being compromised.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Do Your Services Adhere to Compliance Standards Like GDPR, ISO, and NIST?&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221;]Yes, we understand the critical importance of regulatory compliance. Our services are designed with adherence to standards such as GDPR, ISO 27001, NIST frameworks, and other relevant industry regulations in mind. We can help your organization meet its compliance obligations while maintaining a strong security posture.[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Choose a plan that fits your business, with scalable cybersecurity solutions designed to protect and empower.+ Firewall Protection +Daily Threat Scans + Email Security Basics +Standard Support Access + Monthly Risk Summary+ All Essential Features+ Device Endpoint Shield+ Priority Expert Support+ Secure VPN Access+ Cloud Data Protection+ Weekly Reports+ All Pro Features + AI-Powered Threat [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-22","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":1,"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":57,"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/pages\/22\/revisions\/57"}],"wp:attachment":[{"href":"https:\/\/bpd.hr\/index.php\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}