Cyber Risk As A Service

Defend

Our Cyber Protect services are designed to be business effective, integrated and essential for making your organization safe. We can remove duplicative technologies, enhance current implementations, and provide next generation platforms.

Our Approach

1

Identify

Identify and close gaps in the cybersecurity program, business processes & risk oversight.

2

Assist

Assist organizations in the transformation process of their organization’s cybersecurity& risk program.

3

Facilitate

Facilitate an effective integration into the company’s overall enterprise risk management functions.

Defend

External Penetration Test

Timeboxed comprehensive testing the of externally (internet / 3rd parties) facing IT assets to determine if there are any exploitable vulnerabilities available to an attacker that may allow for further exploitation of the internal network.

Defend

Social Engineering Test

Assessors utilize any number of various social engineering techniques to compromise human workforce resource in attempt to gain a foothold in the customer’s environment.

Defend

Internal Penetration Test

Timeboxed comprehensive testing the of internal IT/OT assets to determine if there are any exploitable vulnerabilities available to an attacker that could allow for lateral movement or privilege elevation.

Defend

Breach Simulation

Testers act as motivated attackers that are targeting the customer. Attack vectors include social engineering, external penetration, internal penetration, and physical breach of client site(s). Attackers operate opportunistically (in that once they find a viable attack vector, they continue to move through attack chain.

Defend

Assumed Breach Assessment

Testers operate within the internal network as if they were an authorized user or have achieved breaching perimeter controls. The assessment evaluates the attacker’s ability to move laterally through the network and escalate privileges.

Defend

Hardening Compliance

Tester evaluate an endpoint to determine susceptibility to unauthorized compromise, system break out, and ability to exfiltrate local and network data.

Defend

Physical Security Assessment

Testers evaluate the physical security processes and controls in an effort to gain physical access to a facility.

War is an act of force, and to the application of that force there is no limit. Each of the adversaries forces the hand of the other, and a reciprocal action results which in theory can have no limit.

—Carl von Clausewitz

DEFEND

DEFEND Resources

Data Sheet

Our CI-DR™ framework and technologies are easily integrated into any environment to reduces costs, provide singular views of risk to provide leadership with decision support structures.

Download

Resources

Our CI-DR™ framework and technologies are easily integrated into any environment to reduces costs, provide singular views of risk to provide leadership with decision support structures.

Download

Brochure

Our CI-DR™ framework and technologies are easily integrated into any environment to reduces costs, provide singular views of risk to provide leadership with decision support structures.

Download

Industries we serve

Construction

Finance

Social Media

Manufacturing

Technology

Government

Aerospace

Healthcare