Overview
This release introduces a refreshed plan lineup, upgraded Sydekick frameworks across all tiers, and two new industry-standard compliance frameworks. Clients now have clearer options at every stage of their security journey — from small teams getting started through to organisations with mature compliance requirements.
Available now! Sign up to get started.
New Lite plan
An entry-level plan designed for micro to small teams taking their first steps in cybersecurity, with a focus on scam and fraud prevention.
What's included:
- Up to 5 users
- Security program built on the Sydekick Level One framework
- 8 security domains:
- Asset management
- Access control
- Scam protection
- Data protection
- Email security
- Cloud security
- Network security
- Monitoring
- ~30 guided security tasks with clear next steps
- Basic policy templates (Lite policy pack)
- 4 runbooks:
- New hire onboarding
- Incident response
- Employee offboarding
- Social media account takeover response
- 6 repeating schedules:
- Monthly updates
- Quarterly access reviews
- Backup testing
- Awareness sessions
- Social media security checks
- Stage-based progression across 7 stages with badge rewards
Best suited for
Micro to Small businesses and teams needing a structured, approachable cybersecurity starting point in plain english and without the complexity of full compliance programs.
---
Starter renamed to Core
The former “Starter” plan is now Core, with expanded content and capabilities. Best suited for organisations starting a program of cyber resilience to meet insurance, supply chain or regulatory requirements.Â
What's included:
- Up to 20 users
- Security and Privacy programs
- Sydekick Level Two framework:
- 9 security domains (all Lite domains + Security governance)
- ~65 guided tasks
- All policy templates:
- Security
- Privacy
- Privacy Statement
- Responsible AI
- 11 runbooks (4 security + 7 privacy), including:
- Manage a privacy breach
- Carry out a PIA
- Respond to individual rights requests
- 5 record templates:
- Systems with admin access
- IT asset register
- Key contacts and responsibilities
- Third-party service providers
- Personal information inventory
- Stage-based progression across 12 stages
- Privacy framework included
What's new
- Expanded Level Two task coverage with formal policies and structured processes
- New Security governance domain
- Core-level maturity assessment
- Visual stage-based progression tracking
---
Upgraded Pro plan
Pro now includes two industry-standard compliance frameworks alongside Sydekick Level Three. Built for businesses that must demonstrate certification of global frameworks but don't have the budgets or the resources for the enterprise offerings.
What's included
- Up to 100 users
- Security, Privacy, and Application Security programs
- Sydekick Level Three framework (new):
- 9 security domains
- 100+ guided tasks
- NIST CSF v2.0
- CIS Controls v8
- All policy templates
- 11 runbooks
- 10 record templates, including:
- Data classification register
- Backup and recovery register
- Security training log
- Incident and breach log
- Privacy impact assessment register
- Stage-based progression across 19 stages
- Advanced integrations:
- Dedicated support and custom onboarding
What's new
- NIST CSF v2.0 and CIS Controls v8 available as trackable frameworks
- Expanded enterprise-grade Level Three tasks
- Pro-level maturity assessment domains
- Additional compliance tracking templates
---
New Framework - NIST CSF v2.0
Available on the Pro plan.
The NIST Cybersecurity Framework v2.0 provides a high-level structure for assessing, prioritising, and communicating cybersecurity outcomes.
Structure
- Govern (GV) — Risk strategy and oversight
- Identify (ID) — Assets, risks, vulnerabilities
- Protect (PR) — Safeguards and controls
- Detect (DE) — Threat and anomaly detection
- Respond (RS) — Incident response actions
- Recover (RC) — Restoration and resilience
Details
- 22 domains mapped to Sydekick tasks
- Stage-based progression across 22 stages
- Progress contributes to overall Sydekick posture
---
New Framework: CIS Controls v8
Available on the Pro plan.
The CIS Critical Security Controls provide a prioritised defence-in-depth model.
18 Controls
- Enterprise asset inventory
- Software asset inventory
- Data protection
- Secure configuration
- Account management
- Access control management
- Continuous vulnerability management
- Audit log management
- Email and browser protections
- Malware defenses
- Data recovery
- Network infrastructure management
- Network monitoring and defense
- Security awareness training
- Service provider management
- Application security
- Incident response management
- Penetration testing
Details
- Stage-based progression across 21 stages
- Controls mapped to Sydekick tasks
- Covers hygiene through advanced testing
---
All plans are Available now! Sign up to get started.