Home /

Pricing

Mobile App Scans For Everyone

Flexible Cancellation | Proactive Support

BASIC

End to End Automated Testing

  • Inexhaustible scan quota
  • Dynamic scans
  • Static scans
  • API scans
  • Multiple team members
  • Chat support
  • Remediation support

SEASONED

Automated + Manual Assesments

  • All Basic
  • Manual scan
  • Security Advisory
  • Personal account manager
  • Patching support
  • Dedicated security researcher
  • Dedicated call support agent

TAILORED

Your Rules

  • All Basic + Seasoned
  • Private cloud
  • Dedicated device farm
  • Customised test cases on request
  • Customised reports
  • On-site support on request
  • Add-on benefits

On Demand Add-ons

Learn more about our add-ons to give your business a competitive security advantage!

Web Testing

We have a dedicated team of ethical hackers with expertise in vulnerability assessment of website and mobile website.

Contact Us

SDK Testing

Our breadth of services includes VAPT of SDK's. Our team of ethical hackers are passionate about securing your business.

Request Demo

Certifications

Recon is empanelled by the Computer Emergency Response Team of India to authorise 'Safe-to-host' certificate.

Request Demo

Patching

There's nothing better than a security consultant implementing the best industry security practices on your tech.

Contact Us

FAQs

Recon is a premier Information Security Auditing firm. We are empanelled by Cert-In for providing Information Security Auditing services and have been listed amongst the top 25 most promising consultants of India. Our domain of expertise is providing security solutions on Mobile, Web and Networks from both internal and external vulnerabilities and threats.

With 400+ years of combined industry experience up its sleeves and being one of the few companies empanelled by Cert-In to provide Information Security Auditing services, Recon has proved to be a company that is dedicated, proactive and moreover, a perfectionist. We believe in delivering best results and our portfolio of fortune 500 companies gives us the confidence to keep improving with each passing day.

Yes, of course! Just fill out our enquiry form or simply call us and one of our executives will walk you through the demo.

Once we complete the initial audit, we will send you a report with vulnerability information and patching recommendations. 
After you patch the vulnerabilities, we will perform a second audit to make sure that all vulnerabilities have been patched an no patching has implicated something new. 
After approval from our expert ethical hackers, we will provide you with a closing report and certify the tech to be 'Safe-to-host'.

Cyber Security has now become imperative for all technologies, devices, apps and websites. In recent years, we have seen growing cases of theft and sale of personal, professional and financial details, hacking of devices and technical properties. Believe it or not, only in the first 6 months of 2017, over 6 million records have been hacked, affecting businesses, government, educational and medical data.

Of course we perform manual tests. In addition to it, over time and experience, we have built our own in-house tool to make sure no stone is left unturned. We assure almost almost 100% accuracy. In rare cases where any vulnerability is still found, Recon will acknowledge it and make it right.

All your information is stored in encrypted form and is password protected at all times. Only our certified experts are allowed access to your data. We will also sign an NDA with you to make sure no data is leaked and even the reports that are sent to you are made to go through two levels of protection. Once the project is competed we delete all your data from our servers.

An audit can take anywhere between 2-12 days, depending on the scope of work. Though, if you opt in for our tool subscription (http://reconprolabs.com/registration.php), you will recieve real time audit reports.