Network Operations Center (NOC) services include 24/7 network monitoring, maintenance, support and troubleshooting.
Security Operations Center (SOC) services include monitoring and defending the client’s security posture, analyzing the current security posture for vulnerabilities, and controlling access points when necessary.
Vulnerability Assessments provide our clients with a high-level analysis of their security posture at both internal and external systems, hardware, databases and network levels.
Internet/Intranet Security Assessments include controlled vulnerability analysis that identifies security weaknesses on firewall systems and internet facing access points and servers as well as internal hosts and critical systems on the internal network(s).
Attack and Penetration Services provide our clients with a true attacker perspective related to their external security posture and the extent to which vulnerabilities can be exploited.
WiFi Assessments provide our clients with an analysis of their wireless network, including security exposures, authentication, authorization, integrity and non-repudiation, confidentiality and availability.
Web Application Security analyses focus on at least three specific levels of web development including presentation, content and code review.
Host Vulnerability services are directed at assessing the configuration, access controls, patch levels, and/or software licensing of specific systems or applications.
Social Engineering services include common phone call exercises where names, titles and other information is obtained, but also include physical security analysis and attempts at our clients’ facility breaches without authorization or appropriate credentials.
Digital Forensics and Incident Response services include: digital imaging, file recovery, media declassification, identifying and analyzing evidence related to hacking attempts, fraud, embezzlement, misconduct, etc.
Discovery services include: assessments of external information currently available on the internet to determine if sensitive information is available and unrestricted, identifying and classifying publicly available information to determine the existence and extent of data leakage, improper network configurations, improper employee communications and unauthorized network registration information.
Instructor Led Training covers a wide variety of topics, including but not limited to: cyber security, security awareness, security+, incident response, digital forensics, secure coding, compliance, risk assessments and open-source intelligence.
Staff Augmentation to our clients include both temporary and long-term staff augmentation resources to fill the need for expanded capabilities.