CENTIO
LIVE
Mar 31, 2026 · 00:50 UTC
View Details →

Axios library compromised. ESET XDR blocked it. Our clients kept working.

We take responsibility for your cybersecurity.

25+ years of staying by your side with selected tools, proactive monitoring, a dedicated team, and eyes on your infrastructure around the clock

Real team · 24/7

14 Analysts online right now

Cybersecurity expertise to protect your business

Cybersecurity expertise to protect your business. We bring the skills, experience, and knowledge that most companies lack - so every business gets real protection, regardless of size or budget

Pick Your Level of Protection, three tiers, one promise: we show up

Entry

Start Here

The foundation. For companies that know they need to start

From

€155

/ month

Users: 5

5200

Includes

  • Security posture audit
  • Endpoint protection (ESET or Sophos)
  • Monitoring and incident alerts
  • Monthly status report
  • A real person as your incident contact

Pro

24/7 Coverage

Sleep-at-night security for companies with an IT team

From

€320

/ month

Users: 5

5500

Everything in Entry, plus

  • SOC as a Service — 24/7 monitoring & response
  • Proactive threat hunting
  • Safetica DLP
  • Quarterly penetration tests
  • Incident response with guaranteed SLA
  • ISO 27001 readiness consulting

Custom

Tailored for Complexity

Built for regulatory requirements and complex infrastructure

From

€2500

/ month

Users: 200

Everything in Pro, plus

  • Custom cybersecurity architecture
  • Dedicated security team — your team inside ours
  • Compliance: ISO 27001 / NIS2 / GDPR
  • Red team / blue team exercises
  • Board-level reporting
60% of small businesses close within 6 months after a cyberattack, because: no plan, no monitoring, no team that picks up the phone at 3 AM. We fix that!

Results that show up in your reports

Breaches stop being silent

Real-time telemetry and behavioural rules detect lateral movement before it spreads. Not after

With CENTIO

14 mins

Detection-to-alert SLA on monitored endpoints

Without

202 days

Avg. time before a breach is discovered

Ransomware becomes a blocked alert

ESET XDR catches the encryption pattern in seconds. Our SOC isolates the host before it spreads. The attacker ends up locking an empty machine

With CENTIO

1 hour

SOC containment SLA, before encryption starts

Without

21 days

Avg. ransomware downtime for SMBs

Your IT team stops drowning

We don't replace your team, we take the 24/7 security load off them. They build, we guard. Fewer tickets, fewer midnight pages, more sleep.

With CENTIO

<10%

IT team time on security tickets after handover

Without

60%

Of IT team time spent firefighting security

This Is For You If…

Start here, we'll handle the rest. Four services, one team, full responsibility for everything in between

SOC as a service monitoring. The eyes on your infrastructure that never close

24/7 real team

Penetration testing, a health check for your Infrastructure

Methodology

  1. Phase 01

    Reconnaissance

    Open-source intelligence. Target mapping. Attack surface definition.

    1–2 d
  2. Phase 02

    Scanning & Enumeration

    Port scanning. Service fingerprinting. Vulnerability identification.

    1–2 d
  3. Phase 03

    Exploitation

    Controlled breach attempts. Proof-of-concept for each confirmed finding.

    2–3 d
  4. Phase 04

    Post-Exploitation

    Lateral movement simulation. Privilege escalation. Data access scope.

    1–2 d
  5. Phase 05

    Reporting

    Full findings document. Risk ranking. Step-by-step remediation plan.

    2–3 d

Total: 5–10 business days · Report within 3 days of completion

· 5–10 days · Report in 3 days

ISO 27001, a clear path from where you are today to certified

Certification in 4-6 months

1

Gap analysis & scoping

Week 1–3
2

Policies & documentation

Week 4–12
3

Internal audit & fixes

Week 13–18
4

Certification audit (Stage 1 & 2)

Week 19–24
5

ISO 27001 Certified

Week 24+

NIS2 compliance, a readiness programme before the regulator arrives

Penalty exposure, be audit Ready in 4-5 months

Risk Of Fine €10M
1

Applicability & registration

Week 1
2

Gap assessment

art. 21
Week 2–4
3

Closing the gaps

Week 5–14
4

Documentation & drills

Week 15–18

Compliant & audit-ready

Not sure where to start? A free security audit maps your current exposure

How we work in 3 steps, with no surprises

Free Security Audit

We assess your current posture — endpoints, email, cloud, policies. You get a clear report with prioritized risks. No commitment, no jargon.

Duration

2 weeks

Cost

€0

Tailored Implementation

We configure the right stack for your environment — ESET, Sophos, Safetica, SOC monitoring. We train your team. We set SLAs in writing.

Duration

4–8 weeks

Your effort

~4 hrs/week

Ongoing Responsibility

24/7 monitoring. Monthly reports. Quarterly reviews. Incidents handled by a named contact — not a support queue. You sleep. We watch.

Duration

24/7/365

Response

<1h SLA

Request Free Audit

Tools we chose, configured, monitored & defended

Real clients, real numbers, no theatrics

People first, since 2001

We are CENTIO. Cybersecurity since before it was trendy. 20+ years protecting Bulgarian and international companies with ownership, not just contracts!

We care the most. That is why we take responsibility.

The community that shaped us

  • BSides Sofia

    Sponsored

    Bulgaria's flagship community cybersecurity conference.

  • Cyber4Kids

    Co-founded

    Co-founded by two CENTIO members. Workshops for kids 7–14 across Bulgarian schools.

  • FreedomOnline.bg

    Media

    Bulgaria's leading dedicated cybersecurity news outlet — daily coverage.

  • SafeNet.bg

    Supporter

    National Safer Internet Centre since 2005. EU Insafe network, INHOPE.

Blog, news, analysis, signal

All articles

Become a Partner! You have the clients, we have the team & skills

  • Our expertise, your clients. 20+ years, ESET & Sophos certs, ISO know-how, through you.

  • Revenue without overhead. Resell Entry, Pro, Custom. We deliver. You own the relationship.

  • Technical backing. SOC, incident response, pen testing — powered by our team. You get the margin.

  • Training. We train your staff to speak cybersecurity with confidence.

Start the process

1

Apply

Short intake form. 48-hour response. No gatekeeping.

2

Get Certified

We train your sales and technical staff. Joint playbook.

3

Start Earning

You close. We deliver. Recurring margin on every renewal.

Free Security Audit

See what’s actually at risk
In 2 Weeks, At No Cost

We’ll review your current posture — endpoints, email, cloud, policies — and deliver a prioritized report. No commitment. You decide the next step.

Real team · 24/7
We’re ready for your call!