Services Overview


Enterprise Security Analysis

  • Holistic audit to quickly minimize risk and maximize security
  • Documentation audit option checks documentation is adequate
  • Operations audit option checks operations for consistent and secure execution
  • Validation audit option compares documentation to operations
  • Based on the Top 20 Critical Security Controls
  • Explicit Foundational Cyber Hygiene (FCH) coverage
  • Covers controls for industry-based audits (PCI DSS, HIPAA, ISO, etc.)

Penetration Testing

  • White Box, Black Box, Gray Box, and Combination
  • Web Application and Wireless Penetration Testing
  • Social Engineering (Phishing, Phone, In-Person, etc.)
  • Comprehensive tests, combining numerous tactics
  • Clear, thorough, and prioritized remediation steps
  • Discounted, subscription-based program for continuous testing
  • Discounted retest option to validate remediation steps

PCI Compliance

  • Cardholder Data Environment (CDE) scoping and diagramming
  • Self-Assessment Questionnaire (SAQ) selection and guidance
  • Templates provided for every required compliance document
  • Discounted subscription-based program to ensure you remain compliant

HIPAA Compliance

  • Administrative, Technical, and Physical Assessment
  • Templates provided for administrative controls
  • Vulnerability scan and penetration testing for technical controls
  • Physical security review to ensure your physical controls are adqequate
  • Discounted subscription-based program to ensure you remain compliant

Vulnerability Assessment

  • Proven methodology that reduces risk and maximizes value
  • Authenticated assessment option to improve thoroughness and accuracy
  • False positive identification and findings removal
  • Top 5 recommendations and Top 5 vulnerable systems identification
  • Clear, concise, and prioritized remediation steps
  • Discounted continuous vulnerability assessment and remediation program
  • Discounted reassessment option to validate remediation steps