Network, IoT, firewall, switch, denial of service, Website and email security.
Security code review, security SDLC, application patching and vulnerability scans.
Window and Mac operating system patches. Antivirus, malware and encryption protection.
Cybersecurity training for IT staff, management and employees.
Virtual CISO, Board of Directors, venture capital and executive consultation.
Security maturity, security framework, SOC preparation, policy and compliance reviews.
Frequently Asked Questions
It depends on the type of assessment being performed, availability of the client and size of the organization. That said, an engagement can range from two days to two weeks.
No. Our technical work, internal discovery and evaluation questions are posed in non-technical terms that business owners can easily understand.
Confidentiality is our strong suite. We do not store client data in the Cloud. Instead, it is stored offline and encrypted with AES 256 bit ciphers.
No. If you elect to partner with us for remediation assistance, all we ask is that a trusted employee be given the ability to login and show us various screens.
Yes, our flat hourly rate applies.
For large engagements, 50% is due upon signing the SOW. The remaining 50% is due after the work has been completed.