logo

Select Sidearea

Area for extra info, links, etc.
[email protected]
+(610) 816-010
 

Testing Features

Oops...
Slider with alias features carousel 1 not found.

Vertical Marquee

SOC Implementation: Malware Detected & Removed ● Rogue Accounts Closed ● Smart SEIM ● AI Implemented & Managed

Extended Capabilities: (SOC as a Service2 ● Secure & Compliant Hosting2 ● Threat Detection Gateway2 ● Independent Assessment2 ● Pen Testing2 ● Pre Built Policies & Unified Controls Mapping2

Advanced Methodology: 4 Phases ● 17 Stages ● Organization Wide Collaboration ● Fast Track to Assessment ● Fast Track to Adoption

Cultural Improvement: Cyber Awareness Training ● Phishing Simulation and Testing ● Asset Use

Intelligence: Charts ● Reports ● Dashboards ● Groupings ● Filters ● Data Source Catalogs ● Permissions ● AI Machine Learning1

Risk Response: Plans ● Plan Versioning ● Plan Acceptance ● Sub Plans ● Phases ● Steps ● Responsibilities ● Expected Outcomes ● Test Scheduling ● Test Results

Risk Management: Risk Domains ● Risk Types ● Risk Event Register ● Triggers Association ● Probabilities Association ● Quantification ● Prioritization ● Cost Analysis ● Reduction

Audit Management: Portfolio Management ● Granular Assignment ● Scheduling ● Status / Progress ● Process Definition ● Evidence Collection ● Results Acceptance

Cyber Management Office: Regulatory Frameworks ● Organization Structure ● Profiles ● Controls ● Policies ● Evidence Collection ● Responsibility ● Accountability

Data Mappings: Risk Objectives 2 Systems ● Systems 2 Business Functions ● Systems 2 Landscapes ● Endpoints 2 System Landscapes ● Subnet 2 Location

Technology Dictionary Management: Systems ● System Groups ● Landscapes ● Subnets ● Data Types

Business Dictionary Management: Risk Objectives ● Business Functions ● Country ● State/Province ● Location ● Roles ● Processes

Active Directory Scan: New Accounts ● Domain Admins ● Stale Devices ● Stale Accounts ● Locked Accounts ● Orphaned Objects ● Last Authentication

Data Discovery: Data Files ● File Usage ● Database Managers

Vulnerability Detection: Asset CVE ● Asset CWE ● SCAP Scanning1

Asset Hygiene: Patches Provisioned ● Missing Patches ● Configuration Acceptations

Asset Protection: Asset Base Lines ● Passive File Watch ● Active File Watch / Prevention

Asset Connectivity: Application Dependencies ● System Dependencies1 ● Port Flow Analysis

Asset White Listing: White Listing ● Provisional White Listing ● Black Listing

Asset Lifecycle Discovery: End of Life ● End of Support ● End of Extended Support

Asset Discovery: Hardware Assets ● Software Assets ● Hardware Verification ● Software Verification ● Asset Ownership ● Exhaustive Hardware Configuration Details

Carousel

Slider