Services

Standard services are listed below, but custom services may be performed by request. Please use the contact form at the end of this page for additional details or to schedule a consultation.

 


 

Security Automation

Security automation is essential in your company’s ability to prioritize threats and effectively handle cyber incidents. Areas in security that allow for automation include vulnerability management, incident response, monitoring, detection, and data enrichment. Our team specializes in security automation that will reduce time spent on routine tasks allowing your company to focus on other important work that requires human intervention.


 

Vulnerability Management

Vulnerability management is more than simply running a vulnerability scanner on an annual basis. It includes continual scanning, monitoring, and patching with detailed analysis on vulnerability remediation and reporting. Whether you are just getting started or already have a seasoned vulnerability management program, your organization will benefit from our expertise in products such as InsightVM (Nexpose), Nessus, and Qualys. 

 


 

Vulnerability Assessment

Internal Network, External Network, and Web Application

A vulnerability assessment is an in-depth evaluation of your security posture. By identifying and quantifying security vulnerabilities in your environment, areas of improvement are identified and mitigation procedures are established. A vulnerability assessment may stand on it’s own or act as the part of any qualified penetration test.

 


 

Penetration Test

Internal Network, External Network, and Web Application

A penetration test simulates the actions of a malicious actor (hacker) aiming to breach the security of your organization. More in depth than a vulnerability assessment, vulnerabilities are identified in your environment for improvement and exploited to gain access to critical systems and sensitive information. This is preferred over a vulnerability assessment to firmly establish routes of attack a malicious actor may take.

* All tests may be performed in white box, black box, or gray box environments.

 


 

Security Consulting

Consult with a security expert on security challenges, implementations, projects, or to have as part of your next engagement.

 


 

 

Contact to schedule a consultation:

14 + 10 =