Our Services

Let us secure your business critical assets and manage your cyber risk

Identity Management

Visibility and control over who gets into your network, and what access rights they have once in

  • Identity access governance
  • Identity analytics
  • Unstructured data management
  • Install, configuration, integration and solution management

Security Defense Monitoring

Monitoring and management of your security products’ defense readiness, log activity, and alerts

  • Traditional perimeter defense device management
  • Alarm monitoring
  • Compliance use cases

Managed Detection and Response

Threat hunting, detection, and response – before the attacker reaches his objective

  • Behavioral analysis
  • Big data analytics
  • Threat intelligence & hunting
  • Proactive incident response
  • 24/7 monitoring

Incident Response

Incident response handling when a breach occurs – covering needs from identification to eradication to hardening

Remote and/or fly-in team support and execution of:

  • Identification
  • Containment
  • Eradication
  • Recovery
  • Hardening

CISO Oversight

Guidance around security vision, strategy, and execution required to protect information assets, manage organizational risk, and meet compliance needs

  • Leadership guidance
  • Organizational assessment / advice
  • Security staffing / services
  • Policy / controls effectiveness
  • Budget / risk management

Cyber Academy

Cyber security training designed to elevate and maintain security staff knowledge and readiness

  • Identity management
  • Security monitoring
  • Managed detection and response
  • Incident response
  • Certification
  • Continuing education
  • Skills advancement