• null

    BEST PRICE - GREAT VALUE

    Over 50% of hacking attempts are successful if they rely on a human error. The combination is particularly dangerous if the technical protective measures do not work together. Our software enables MSP’s and resellers to solve this problem with the best security awareness training and security testing platform on the market.

    MSP’s can operate LUCY in the cloud or on-premise with their own branding for their customers and quickly expand their service offering with training, attack simulations, infrastructure tests and darknet analyses. Our annual fixed price, which knows no limits with regard to the number of customers or recipients, enables MSP’s to achieve the best possible margins in the entire market.

In the past, security providers have focused primarily on establishing a secure IT infrastructure for their customers. The firewall protection of the perimeter combined with various technical measures to protect the workplace is standard today. For this reason, hackers target their attacks on employees. Such attacks are called social hacking.

Phishing is the best known type of social hacking. Even more dangerous than entering sensitive data on websites are those attacks in which the employee is tricked into subconsciously introducing malware into the company. The uninterrupted stream of data leaks shows this problem. This is what we can stop. LUCY is the only platform in the world that can both measure and improve the lack of awareness and at the same time measure the technical risk.

PARTNER MODELS

SERVICE
PARTNER

Many customers do not want to manage their campaigns themselves and prefer the partner to offer the services from a cloud-based server. In this case, the service partner can use their own LUCY server. This model does not require a special contract between the service partner and LUCY. It is sufficient for the service partner to purchase a regular LUCY edition. The service partner’ s customers can then be billed with an individual pricing model (e.g. user-based). LUCY does not charge royalty fees for the campaigns created in the software. Example: A MSP buys the Professional Edition for USD 3800. With this edition the service partner can create unlimited campaigns/recipients on his platform. With the integrated white label function, the service partner can also use his own custom branding. The partners clients can be given a view-only access to monitor their campaigns in real time.

LEP
PARTNER

LEP stands for LUCY Ecosystem Partner. In certain industries, customers prefer to install LUCY on site mainly for security and privacy reasons. In this model, the LEP partner becomes a LUCY reseller, helps client to install LUCY on premise and receives different discount levels depending on the number of licenses sold. LEP partners pay a partner fee of USD 2500. In this price included is an unlimited ULTRA edition license for their own use. Discounts for LEP partners apply.

OEM
PARTNER

The OEM edition is designed for partners who have customers who want to manage their own LUCY server. The OEM edition can be installed in the cloud (at LUCY’s preferred provider or any other provider) or on site at the partner’s data center. With just a few clicks, the OEM partner can boot a white-labeled LUCY edition within the OEM software and grant its customers or resellers access. The LUCY editions created in the OEM platform will be charged to the end client of the OEM partner.
More info here.

SAMPLE USE CASES

  • Partner has less than 10 potential clients
  • Clients want the partner to provide all services (SaaS)

Clients have in average less than 50 recipients?

Clients have in average less than 50 recipients?

Focus on attack simulations with only few training

LUCY Starter Edition

LUCY Professional

  • Partner has more than 10 potential clients
  • Clients want to administrate their own LUCY servers

LUCY OEM model

Additional to attack simulations, clients need a large selection of training modules

LUCY Premium Edition

LUCY Ultra Edition

  • Partners client’s need on-premise installations of LUCY and partner can commit to minimum 5 client installations/year

LUCY LEP model

Partner REFERENCES

Our certified partners provide senior know-how, local knowledge, technical expertise and other value-added services.
All partners are trained by LUCY and have successfully completed Phishing Simulations, Awareness
Trainings, Malware Simulations, and IT-Security Assessments with LUCY.

null
Australia – Content Security is a wholly Australian owned IT security integration and consulting firm. Founded in March 2000, Content Security has since grown to provide security products, solutions, support, and consultation to over 800 active customers.

The company has offices in Sydney, Melbourne and Brisbane.

null
Canada  – Kereon  is providing a world-class training and Cybersecurity expertise to its customers worldwide, using a common sense approach in line with the ever growing Information Security challenges that companies are facing. The company has developed a Security Awareness program called Awee® based on a multidisciplinary team of professionals. Our seasoned experts possess a success-based track-record covering.
null
Canada  – Precicom Technologies Inc. specializes in outsourcing, information security and digital intelligence. Precicom is a company recognized for its know-how and expertises. In order to better serve its clients, Precicom ensures to deliver value and increase customer’s knowledge. The company has won various awards over the last few years for its know-how and remains among the leaders in its sector. The more we help our clients to develop skills in this great IT world, the more we succeed and develop a winning business relationship.
null
Chile  – Pentest SPA located in Santiago, Chile are experts in ethical hacking. It is a low profile company as they are concerned about maintaining the confidentiality of their customers. They are passionate about breaking things and then proposing solutions and thus contribute with Pentests’ grain to the security of the internet and finally know the business of their clients to understand what needs to be protected and guarded.
null
Germany / Deutschland – Axsos AG offers user-oriented IT from a single source: Listening and customer understanding are the credo of the IT-integrator from Stuttgart with further locations in Germany and abroad. The company’s main service areas are IT security, IT infrastructure and individual development. If the need exists, then these areas are combined into one unit as a complete package. IT security is essential for every company’s success and Axsos understands the art of developing a suitable security strategy for your customers and finding the right balance between risk minimization and acceptance when implementing it.
null
Germany / Deutschland – The BWG Systemhaus Guppe is a leading German System Integrator in the area of IT-infrastructure, IT-Security, Medical IT and Managed IT-Services. Having close to 100 employees the company is headquartered in Ettlingen near Karlsruhe and has additional offices in Stuttgart, Freiberg (Sachsen) and Leipzig. BWG is providing excellent services for Phishing simulations, other Social Engineering scam simulations and even simulated malware atacks to their clients. BWG has also an outstanding training offer for the increase of IT-Security awareness. Please go to the  Phishing services from BWG.
null
India & Singapore – Irisk Assurance brings together some of the most talented & experienced audit, Assurance & Information Security Professionals in Southern Asia and their services are comparable to any leading consultancy service organizations in the industry except that Irisks’ service is highly personalized and focused on an sustainable relationship. The main focus of Irisk is to deliver customer centric, value added services such as Enterprise Governance, Risk & Compliance Services including Information Security consulting & Audit services and SSAE 16 & SOC II audit & attestation services.

“Out of all the best of breed tools in the market, LUCY stands out for its product capability and flexibility. From pre-built, multiple customizable phishing email templates, scenarios & videos and detailed reporting /statistics for each campaign to high quality Security Awareness training modules, LUCY has a rich repertoire of all the functionality that is required to conduct a successful Phishing simulation service. LUCY is highly flexible as it offers the option of cloud or onsite deployment.” – Bala R.  Managing Director and CEO, Irisk Assurance

null
Hungary / MagyarországSecurenetworx. The Company’s creed: We believe, that in the upcoming years, the APT and malware-based attacks will cause or prepare the most of these incidences, therefore we provide services, that helps our customers to prepare these attacks, they can detect these attacks and they can reduce the damages and risks by these attacks.
null
Slovenia and the Balkans – Hic Salta has been a recognized company for more than 20 years and well known all over the Slovenian borders. The company specializes in IT-Security audits, risk management and consulting in the area of the ISO 27001 standard. The customer portfolio consists primarily of well-known public organizations and banks in South-East Europe. In the technological area, products and services in the field of e-mail security, IDS / IPS systems and firewalls belong to the core portfolio. In addition to LUCY, the company has partnerships with Clearswift, Sourcefire, Watchguard, GFI and Opentext.
null
Saudi Arabia – Managed Services Company specializes in providing bespoke services in the field of Cyber Security. These services range from
identifying threats and vulnerabilities to planning, designing and implementing the relevant technological, organizational and risk-based
countermeasures. The company is a managed service provider specializing in cyber threat intelligence, brand protection solutions, and security-management for complex systems.

We help our customer to secure his technologies by developing the right strategies and manage their security!

null
Switzerland / Schweiz – terreActive has been in the IT security business for more than 20 years and is one of the most well-known providers in the Swiss market. The company not only advises, but also integrates security solutions into the customers IT landscape, be solutions for security monitoring, log management (Splunk and others), web, email and application security or network security, to name but a few. The company also operates Managed Security Services in the sense of a Security Operations Center (SOC) for over 80 customers. During certification as an ecosystem partner, LUCY Security was able to get a picture of the company’s abilities and is deeply impressed by the concentrated competence. Learn more about terreActive’s offering on their web site www.securitymonitoring.ch
null
Turkey – BRING IT Services‘ aim is Bridging the Ingenuity Gap between Customers and Perfect IT Solutions. BRING IT Services offers solutions to Enterprises to overcome the challanges they have in Data Management and Information Security processes. We help Organizations to find the best ways to Manage and Secure their Data, wherever it resides! www.bring.com.tr
null
United Kingdom –  Neoteric Networks is proud to partner with LUCY Security to deliver a comprehensive approach to Cyber Security.  With Digitization, Cloud and the blurring of network borders, Cyber Security needs to help shape your business strategies and avoid any malicious attacks.  Learn how Neoteric Networks and LUCY Security can reduce your attack surface whilst raising awareness.

LUCY fits in exactly where we need it to, helping our customers raise awareness through simulated attacks and delivering the training to where it is needed most.  With ever increasing sophisticated attacks from Hackers it is proving an invaluable tool.” – Rebecca Lee, Director Neoteric Networks”.

null
United States – Envoy Data Corporation is a leading value-added distributor of IT Data Security Solutions. They take pride in proactively supporting IT companies and resellers through engineering, design, marketing, and sales support. Envoy offers offer best-of-breed IT security solutions like LUCY Server for customers in almost any market.

The goal of the company is simple; leverage the IT Security industry experience and partner relationships to provide quality solutions, services, and logistics at a competitive price.

Interested in becoming a LUCY LEP partner?

Apply Now!