logo

Select Sidearea

Area for extra info, links, etc.
[email protected]
+(610) 816-010
 

Testing Features

Oops...
Slider with alias features carousel 1 not found.

Vertical Marquee

SOC Implementation: Malware Detected & Removed ● Rogue Accounts Closed ● Smart SEIM ● AI Implemented & Managed

Extended Capabilities: (SOC as a Service2 ● Secure & Compliant Hosting2 ● Threat Detection Gateway2 ● Independent Assessment2 ● Pen Testing2 ● Pre Built Policies & Unified Controls Mapping2

Advanced Methodology: 4 Phases ● 17 Stages ● Organization Wide Collaboration ● Fast Track to Assessment ● Fast Track to Adoption

Cultural Improvement: Cyber Awareness Training ● Phishing Simulation and Testing ● Asset Use

Intelligence: Charts ● Reports ● Dashboards ● Groupings ● Filters ● Data Source Catalogs ● Permissions ● AI Machine Learning1

Risk Response: Plans ● Plan Versioning ● Plan Acceptance ● Sub Plans ● Phases ● Steps ● Responsibilities ● Expected Outcomes ● Test Scheduling ● Test Results

Risk Management: Risk Domains ● Risk Types ● Risk Event Register ● Triggers Association ● Probabilities Association ● Quantification ● Prioritization ● Cost Analysis ● Reduction

Audit Management: Portfolio Management ● Granular Assignment ● Scheduling ● Status / Progress ● Process Definition ● Evidence Collection ● Results Acceptance

Cyber Management Office: Regulatory Frameworks ● Organization Structure ● Profiles ● Controls ● Policies ● Evidence Collection ● Responsibility ● Accountability

Data Mappings: Risk Objectives 2 Systems ● Systems 2 Business Functions ● Systems 2 Landscapes ● Endpoints 2 System Landscapes ● Subnet 2 Location

Technology Dictionary Management: Systems ● System Groups ● Landscapes ● Subnets ● Data Types

Business Dictionary Management: Risk Objectives ● Business Functions ● Country ● State/Province ● Location ● Roles ● Processes

Active Directory Scan: New Accounts ● Domain Admins ● Stale Devices ● Stale Accounts ● Locked Accounts ● Orphaned Objects ● Last Authentication

Data Discovery: Data Files ● File Usage ● Database Managers

Vulnerability Detection: Asset CVE ● Asset CWE ● SCAP Scanning1

Asset Hygiene: Patches Provisioned ● Missing Patches ● Configuration Acceptations

Asset Protection: Asset Base Lines ● Passive File Watch ● Active File Watch / Prevention

Asset Connectivity: Application Dependencies ● System Dependencies1 ● Port Flow Analysis

Asset White Listing: White Listing ● Provisional White Listing ● Black Listing

Asset Lifecycle Discovery: End of Life ● End of Support ● End of Extended Support

Asset Discovery: Hardware Assets ● Software Assets ● Hardware Verification ● Software Verification ● Asset Ownership ● Exhaustive Hardware Configuration Details

Carousel

1 Asset Discovery Asset Discovery Hardware Assets
Software Assets
Hardware Verification
Software Verification
Asset Ownership
Exhaustive Hardware Configuration Details
2 Asset Use Asset Use Share Discovery
Accounts
Hidden Accounts
Log on History
Remote Logon History
Last Reboot
Services
Software Usage
Resource Utilization
3 Asset Lifecycle Discovery Asset Lifecycle Discovery End of Life
End of Support
End of Extended Support
4 Asset White Listing Asset White Listing White Listing
Provisional White Listing
Black Listing
5 Asset Connectivity Asset Connectivity Application Dependencies
System Dependencies1
Port Flow Analysis
1Functionality Provisioned Q2 – 2020
6 Asset Protection Asset Protection Asset Base Lines
Passive File Watch
Active File Watch / Prevention
7 Asset Hygiene Asset Hygiene Patches Provisioned
Missing Patches
Configuration Acceptations
8 Vulnerability Detection Vulnerability Detection Asset CVE Asset CWE SCAP Scanning1 1Functionality Provisioned Q2 – 2020 1 Data Discovery Data Discovery Data Files File Usage Database Managers 2 Active Directory Scan Active Directory Scan New Domain Admins Stale Devices Stale Accounts Locked Accounts Orphaned Objects Last Authentication 3 Business Dictionary Management Business Dictionary Management Risk Objectives Business Country State/Province Location Roles Processes 4 Technology Dictionary Management Technology Dictionary Management Systems System Groups Landscapes Subnets Data Types 5 Data Mappings Data Mappings Risk Objectives 2 Systems Systems 2 Business Functions Systems 2 Landscapes Endpoints 2 System Landscapes Subnet 2 Location 6 Cyber Management Office Cyber Management Office Regulatory Frameworks Organization Structure Profiles Controls Policies Evidence Collection Responsibility Accountability 7 Audit Management Audit Management Portfolio Management Granular Assignment Scheduling Status / Progress Process Definition Evidence Collection Results Acceptance 8 Risk Management Risk Management Risk Domains Risk Types Risk Event Register Triggers Association Probabilities Association Quantification Prioritization Cost Analysis Reduction 1 Risk Response Risk Response Plans Plan Versioning Plan Acceptance Sub Plans Phases Steps Responsibilities Expected Outcomes Test Scheduling Test Results 2 Intelligence Intelligence Charts Reports Dashboards Groupings Filters Data Source Catalogs Permissions AI Machine Learning11Functionality Provisioned Q2 – 2020 3 Cultural Improvement Cultural Improvement Cyber Awareness Training Phishing Simulation and Testing Asset Use 4 Advanced Methodology Advanced Methodology 4 Phases
17 Stages
Organization Wide Collaboration
Fast Track to Assessment
Fast Track to Adoption
5 Extended Capabilities Extended Capabilities SOC as a Service2
Secure & Compliant Hosting2
Threat Detection Gateway2
Independent Assessment2
Pen Testing2
Pre Built Policies & Unified Controls Mapping2
2Partner Provided Advanced Services / Functions

Slider

1 Asset Discovery Asset Discovery Hardware Assets Software Assets Hardware Verification Software Verification Asset Ownership Exhaustive Hardware Configuration Details 2 Asset Use Asset Use Share Discovery Accounts Hidden Accounts Log on History Remote Logon History Last Reboot Services Software Usage Resource Utilization 3 Asset Lifecycle Discovery Asset Lifecycle Discovery End of Life End of Support End of Extended Support 4 Asset White Listing Asset White Listing White Listing Provisional White Listing Black Listing 5 Asset Connectivity Asset Connectivity Application Dependencies System Dependencies1 Port Flow Analysis 1Functionality Provisioned Q2 – 2020 6 Asset Protection Asset Protection Asset Base Lines Passive File Watch Active File Watch / Prevention 7 Asset Hygiene Asset Hygiene Patches Provisioned Missing Patches Configuration Acceptations 8 Vulnerability Detection Vulnerability Detection Asset CVE Asset CWE SCAP Scanning1 1Functionality Provisioned Q2 – 2020 1 Data Discovery Data Discovery Data Files File Usage Database Managers 2 Active Directory Scan Active Directory Scan New Domain Admins Stale Devices Stale Accounts Locked Accounts Orphaned Objects Last Authentication 3 Business Dictionary Management Business Dictionary Management Risk Objectives Business Country State/Province Location Roles Processes 4 Technology Dictionary Management Technology Dictionary Management Systems System Groups Landscapes Subnets Data Types 5 Data Mappings Data Mappings Risk Objectives 2 Systems Systems 2 Business Functions Systems 2 Landscapes Endpoints 2 System Landscapes Subnet 2 Location 6 Cyber Management Office Cyber Management Office Regulatory Frameworks Organization Structure Profiles Controls Policies Evidence Collection Responsibility Accountability 7 Audit Management Audit Management Portfolio Management Granular Assignment Scheduling Status / Progress Process Definition Evidence Collection Results Acceptance 8 Risk Management Risk Management Risk Domains Risk Types Risk Event Register Triggers Association Probabilities Association Quantification Prioritization Cost Analysis Reduction 1 Risk Response Risk Response Plans Plan Versioning Plan Acceptance Sub Plans Phases Steps Responsibilities Expected Outcomes Test Scheduling Test Results 2 Intelligence Intelligence Charts Reports Dashboards Groupings Filters Data Source Catalogs Permissions AI Machine Learning11Functionality Provisioned Q2 – 2020 3 Cultural Improvement Cultural Improvement Cyber Awareness Training Phishing Simulation and Testing Asset Use 4 Advanced Methodology Advanced Methodology 4 Phases 17 Stages Organization Wide Collaboration Fast Track to Assessment Fast Track to Adoption 5 Extended Capabilities Extended Capabilities SOC as a Service2 Secure & Compliant Hosting2 Threat Detection Gateway2 Independent Assessment2 Pen Testing2 Pre Built Policies & Unified Controls Mapping2 2Partner Provided Advanced Services / Functions