What We Do
By bringing solutions to market that address each of these three pillars, and giving them common DNA so that they can be connected together end to end, we believe that IT security can be better, easier to use and less expensive. And most importantly, it can become a driver of innovation, rather than an obstacle to it. As part of this, we offer the following services:
Vulnerability Assessment - Our consultants work with your staff to generate an evaluation of your current technology, infrastructure, security posture and policies and compare it to globally accepted standards. Our assessment can be focused on the risk or it can be technical or based on policy or governance.
Risk Advisory Services - We provide expertise and experience to our customers so that they can make an informed decision on how best to deal with known vulnerabilities in their company as efficiently and as cost effectively as the customer decides.
PCI DSS Compliance - We provide the following services as part of our Compliance Practice:
PCI DSS GAP Assessments
PCI DSS Remediation Planning
PCI DSS Compliance Assessments
Managed Security Services - We provide on going monitoring services to ensure your company continues to meet current standards and to watch for any indication of suspicious activity. As part of this we provide real time monitoring, detection and remediation to the resolution of a security incident. This monitoring can be done on a real time, daily, or monthly schedule. We also provide threat and vulnerability management which involves proactive identification and remediation as well as tools to proactively minimize risk and exposure.
Incident Response - We provide established processes, experience and specialized tools for the analysis of all activity leading up to a security incident as well as the damage caused as a result of the incident.
Compromise Response - We also provide based on our IR, Incident Response Team, the process for remediation as well as evidence in the instances of legal process. Should the determination be made that the breach was malicious and sensitive or Personally Identifiable Information, PII, was stolen, we will escalate to and work with the appropriate law enforcement agency for an expanded investigation.