Cybersecurity (as a Service)
- Cyber Incident Response Services
- Proactive/Reactive Incident Response Services
- Remediation and Recovery Services
- IT Expert and cyber recovery
- Cyber vulnerability mitigation and resilience
- Complimentary scanning or in-depth
- Security Business Practice Review
- Complimentary security portfolio and roadmap review, Security Maturity Assessment, Ransomware Readiness
Cyber Incident Support
Identify
Set of services to help identify and take inventory of current risks, including risks to systems, assets, and data
Protect
Set of services that help safeguard, contain, or minimize the impact arising from Cybersecurity occurrences
Detect
Set of services that provide timely and/or crucial detection and allows for the proper response to be initiated
Respond
Set of services that respond at containing cyber threats and its adverse effects
Recover
Set of services that help to quickly restore or recover from impaired services, capabilities, and capacities back to normal operation
Identify
- Vulnerability Assessments
- Security & Risk Assessment
- Risk Assessment & Management Planning
- Governance Assessments – PIPDEA, HIPAA, GLBA, PCIDSS, GDRP, etc.
- Security Awareness Training Services
- Disaster Recovery Planning
- Business Continuity Planning
- Asset Disposal / Data Destruction
- Source Code Review
Detect
- Vulnerability Assessments
- Network Penetration Testing
- Ethical Hacking - Red Team / Blue Team
- Web Application Penetration Testing
- Network Operations Center (NOC)
- Security Operations Center (SOC) - Managed SIEM
- Security Awareness Training
- Social Engineering
- Source Code Review
Protect
- Configuration and Install
- Patch Management
- Access Management Control Services
- Network Operations Center (NOC)
- Security Operations Center (SOC) - Managed SIEM
- Security Awareness Training
- Ethical Hacking - Red Team / Blue Team
- Social Engineering
- Information Security Policy Creation
- Business Continuity Planning
- Asset Disposal / Data Destruction
Respond
- Incident Response Procedures
- Incident Response
- Disaster Recovery Planning
- Business Continuity Planning
Recover
- Disaster Recovery Planning
- Business Continuity Planning
Learn more about our packages and how to get started with a Free Vulnerability Scan.
Monitor
Identify
- Vulnerability Assessment (4 per year)
- Security Awareness Training
Detect
- Security Operations Center (SOC) - Managed SIEM
- Penetration Testing (1 per year)
Advanced Services
- Virtual CISO Services (On-Demand)
Resilient
Identify
- Vulnerability Assessment (4 per year)
- Security Awareness Training
Protect
- Information Security Policy Creation
- Social Engineering (Phishing simulation quarterly)
Detect
- Security Operations Center (SOC) - Managed SIEM
- Penetration Testing (2 per year)
Respond
- Incident Response (retainer)
Recover
- Business Continuity Planning
Advanced Services
- Virtual CISO Services (On-Demand)
Armor
Identify
- Vulnerability Assessment (4 per year)
- Governance Assessments – PIPDEA, HIPAA, GLBA, PCIDSS, GDRP, etc.
- Security Awareness Training
Protect
- Patch Management
- Information Security Policy Creation
- Social Engineering (Phishing simulation quarterly)
Detect
- Security Operations Center (SOC) - Managed SIEM
- Penetration Testing (2 per year)
- Web Application Penetration Testing
Respond
- Incident Response (retainer)
Recover
- Disaster Recovery Planning
- Business Continuity Planning
Advanced Services
- Virtual CISO Services (Subscription)