Audits & assessment

MGA/TPA Assessments :Specific (third party) security assessments designed to evaluate the cyber security risks and controls of an MGA/TPA.
VA/PT Assessments: Network vulnerability assessments or penetration tests used to assess vulnerabilities, or the likelihood of exploiting a series of vulnerabilities to gain access into a corporate network.
Cloud Security Assessments: Specific (third party) security assessments designed to evaluate the cyber security risks and controls of a cloud service provider.
Third Party Assessments: Specific (third party) security assessments designed to evaluate the cyber security risks and controls of any other third party service or data provider.
Risk/Social Engineering Assessments: Assessments designed to test the staff’s security awareness and the security policies and controls that affect the staff.

Protection services

Data Protection Security: Projects that focus on locating, and securing all sensitive data at-rest and in-transit, should even include protecting data that resides at third parties.
Identity Access Management: Services, IaaS Security projects that focus on designing, building, administering, and/or implementing identity access systems, and role-based access – like SailPoint or Happiest Minds, etc.
Privileged Access Management: Security projects that focus on designing, building, administering, and/or implementing privileged account access management systems – like CyberArk.
Perimeter Cyber Protection Security: Projects that focus on designing, building, administering, monitoring, and/or implementing perimeter defenses including things like firewalls, specialized firewalls web application firewalls (WAF), intrusion detection/prevention systems (IDS/IPS), distributed denial of service protections (DDoS), mail filtering, DNS protection, etc.

Monitoring services

Incident Response: Management Security projects that focus on designing, building, managing, testing, and/or implementing incident response preparedness plans, resources, teams, etc. to prepare customers to respond to security incidents.
Data Breach Response: Security projects that focus on post incident response and help customers determine root causes, control losses, communication, and threat/risk removal. Security Operations/Monitoring Provide any level of security (back-office) operations, administration, or monitoring for customers.
Threat Intelligence Center: Determine the customer’s risks and threats and setup a system to monitor them across all types of public sources, and social media.
Threat Monitoring :Security projects that focus on designing, building, administering, monitoring, and/or implementing specific insider threat intelligence systems that monitor users of network resources – like RedOwl.

Monitoring services

Incident Response: Management Security projects that focus on designing, building, managing, testing, and/or implementing incident response preparedness plans, resources, teams, etc. to prepare customers to respond to security incidents.
Data Breach Response: Security projects that focus on post incident response and help customers determine root causes, control losses, communication, and threat/risk removal. Security Operations/Monitoring Provide any level of security (back-office) operations, administration, or monitoring for customers.
Threat Intelligence Center: Determine the customer’s risks and threats and setup a system to monitor them across all types of public sources, and social media.
Threat Monitoring :Security projects that focus on designing, building, administering, monitoring, and/or implementing specific insider threat intelligence systems that monitor users of network resources – like RedOwl.