Shop


Click Here for your FREE Alpha Invite!

Cyber Security Plan

HONEST BIT
Billed Monthly or Annually

$19.99
  • per month.
  • No Hardware
  • Free Upgrades
  • Cancel Anytime
  • No Cancellation Fee
  • No Installation Fee
  • No Setup Fee
  • No Contract
  • Included Hardware
  • Hardware is NOT required.
  • Hardware purchased separately.
HONEST NIBBLE
Billed Monthly or Annually

$39.95
  • per month.
  • Free Hardware
  • Free Shipping
  • Free Upgrades
  • Cancel Anytime
  • No Cancellation Fee
  • No Installation Fee
  • No Setup Fee
  • No Contract
  • Included Hardware
  • SecureBeacon Sensor
HONEST BYTE
Billed Monthly or Annually

$59.95
  • per month.
  • Free Hardware
  • Free Shipping
  • Free Hardware Upgrades
  • securerouter.io Domain
  • Free Upgrades
  • Cancel Anytime
  • No Cancellation Fee
  • No Installation Fee
  • No Setup Fee
  • No Contract
  • Included Hardware
  • SecureRouter Gateway
  • SecureBeacon Sensor

* All plans are subject to a one time SMART THING support and sign-up fee due at checkout


All Cyber Security Plans Include Plenty of Features Granting Peace of Mind


Deep cyber security insight to protect your home and business

Double-Layered DNS Security

Rest assured knowing that our secure name resolution technology provides network name integrity and blocks domains associated with malware, phishing, and other digital threats such as IoT botnets. Say goodbye to DNS spoofing!*

Ad Blocking and Malicious Content Filtering

Are advertisements ruining your web experience? Are you aware your browsing habits are being tracked? Command provides built-in Ad blocking and malicious content filtering for all of your devices!*

Threat Detection, Prevention, and AntiVirus

Provide intelligent network-level AntiMalware protection for all of your devices and easily block network exploits and malicious software and activity network wide. Identified threats are automatically quarantined to facilitate remediation.*

Secure Hardware and Software

Find solace in knowing that we work hard to secure our offerings by subjecting our systems to regular security hacking. If a vulnerability is found, we’ll fix it. Security is a constant battle, and our goal is to build humanity robust cyber systems with security prioritized from inception.

Real-Time Alerting

Receive critical alerts for concerning cyber events such as cyber attacks, unencrypted communications, and unexpected network connections with malicious third-parties. Alerts are also generated for non-security events such as connecting new devices to your network.*

Device Discovery and Vulnerability Assessment

From hacked devices and security misconfiguration to zero day vulnerabilities and targeted exploitation, we hunt and eradicate cyber threats. Our ethical hackers are providing security and protection for every connected THING.*

Analyze Phishing Emails and Messages

Many individuals are inexperienced in the art of malicious email analysis and identification. Our ethical hackers can help, providing actionable recommendations for when you need a second opinion.

Robust Command Center Infrastructure

Highly resilient, distributed cloud infrastructure delivering unmatched security, reliable uptime, and fast network access. We take the cyber beat down so your network and all the THINGS don’t have to.

Emergency Cyber Alerting and Response

CYBER THREAT DETECTED! Cyber Rescue is dispatched via activation of the SOS alarm. Once activated, HONEST Security will be notified and one of our ethical hackers will contact you to ensure cyber safety and peacefulness. Our purpose is to protect you!*

Access to an Ethical Hacker

Reach out to us via CommandChat at any time so we can answer your questions on how to keep safe and secure in cyberspace. Remember, we’re your protector and peace of mind.

24×7 Monitoring and Response

Provide intelligent network-level AntiMalware protection for all of your connected devices and easily block malicious software network wide.*

Dynamic Protection Unique to You

Threat and Trust modeling are the foundation upon which secure systems are built. No computing environment is the same. Therefore it is critical to formulate security models specific to your environment to ensure the greatest level of protection.*


Protecting your privacy and and identity

Privacy Protection

Prevent network spying and malicious surveillance. Have peace of mind knowing our double-layered secure DNS and network threat detection are actively working to rid your network of privacy invading trackers and unexpected network connection.*

Cyber Identity Monitoring

Let us help you identify publicly exposed personal resources and data so you can take your identity back. From personal information to compromised user accounts, we’re on the hunt for your exposed data!

Unmatched Cybersecurity Experience

Go for GOLD. Fueled by knowledge, experience, and insight from some of the world’s greatest names in ethical hacking and cyber defense.

Advanced Cyber Threat Intelligence

Powered by advanced machine intelligence, rigorous human analysis, and multi-point metadata aggregation and processing.


Internet safety and parental controls

Network Visibility

Providing you with holistic overview of your network and all connected devices. Who? What? Where? When? Keep an eye on your network devices and know WHO’s accessing WHAT, from WHERE, and WHEN the access occurred.*

Device Management and Time Limits

Keep the internet safe. Protect your kids on ANY device with network wide protection. Set and enforce screen time limits. Get notified when your kids’ devices become active on your network!*

Secure Network in your Pocket

HONEST PhoneHome gives you the power and security of your Command protected network while on the go. The same great features are available when using cellular or other WiFi connections.*

Website Content Filtering

Automatically enforce search engine Safe Search, block adult content network wide, and create content filtering rules based on predefined categories such as social media and gambling.*


Keep it simple stupid (KISS)

Managed Cyber Security System

Combating advanced adversarial threats requires continuous 24/7/365 monitoring, hunting, analysis, security testing and configuration. This is an impossible feat for the average Joe. We do all the heavy lifting so you can focus on doing you.

Super Duper Simple

You want simple? Your wish is our Command. Our solution requires no hardware to manage or software to update, and takes minutes to install.

Reporting

We provide an up-to-date depiction of your protected network’s overall cyber health and uptime. Our team of ethical hackers will prepare, deliver, and review digestible reports detailing your current status of your cyber security. Sit back, relax, and enjoy your custom threat and security feed!*

Personalized Cyber Awareness Training

Our team of ethical hackers provides personalized cyber awareness training material tailored to the cyber security needs of your computing environment. We focus on the subjects that challenge you most.

* Feature as described require HONEST Hardware.


Showing all 3 results

Showing all 3 results