TRANSFORM, MODEL, and VISUALIZE. Advanced infrastructure security planning, design, oversight, assessments, testing and monitoring for businesses and entities who prefer to remain confidential.
• Incident Response – the main service: containment and eradication
• Advisory Distribution – issues advisories in regard to new vulnerabilities and how to mitigate same
• Vulnerability Assessment – performs penetration testing and other assessment techniques to find vulnerabilities and how they may be exploited
• Intrusion Detection – detects possible compromising events
• Education and Awareness – bulletins, online boards, workshops, seminars, posters, etc.
• Technology Watch – keeps abreast of new technologies and explores the feasibility of same
• Patch Management – keeps software and hardware updated with the latest versions of revisions
• Forensics – full forensics capabilities