Protecting the Unprotectable
Call Us at: 951.NET.FORCE

What We Do

Security Advisory and Assessment

  • Network Vulnerability Assessment
  • Internal Penetration Assessment
  • External Penetration Assessment
  • Wireless Security Assessment
  • Network Security Assessment
  • Cloud Security Assessment
  • Mobile/BYOD Security Assessment
  • Physical Security Assessment
  • Social Media Security Assessment
  • Social Engineering Security Assessment

Application Security Assessment

virus-scan-icon150
  • Web Application Penetration Assessment
  • Mobile App Penetration Assessment (iOS, Android, HTML5)
  • Product Security and Penetration Assessment
  • Source Code Security Assessment
  • Threat Modeling and Architecture Assessment
  • Application Security Conceptualization and Design

Information Systems Audit

social
  • General Controls Review Audit
  • Application Control Review Audit
  • Technical Review Audit
  • Systems and Application Audit
  • Information Processing Audit
  • Systems Development Audit
  • Management of IT and Enterprise Architecture Audit
  • Client/Server, Telecommunications, Intranets and Extranets Audit
 

Incident Response

  • Emergency Incident Response
  • Incident Remediation Services
  • Incident Response Program Development
  • Incident Response Staff Augmentation
  • Incident Response Retainer Services
  • Incident Perception Management
  • Incident Public and Media Relations

High-Tech Investigations

  • Corporate
  • Employment
  • Embezzlement
  • Family Law
  • Fraud
  • Human Trafficking
  • Intellectual Property Theft

Electronic Discovery

  • E-Discovery Identification
  • E-Discovery Collection and Preservation
  • E-Discovery Retainer Services
  • Expert-Witness and Litigation Support

Digital Forensics

  • Mobile Forensics Investigation
  • Tablet Forensics Investigation
  • Computer Forensics Investigation
  • Digital Media Investigation

Incident Readiness

  • End-User Security Awareness Training
  • Developer and Engineering Training
  • Incident Readiness Drills and Assessment
  • Incident Response Program Development

Business Continuity and Disaster Recovery

  • BCDR Assessment
  • BCDR Walkthrough
  • BCDR Exercises
  • BCDR Program Development

Governance and Risk Management

check
  • Security Governance and Program Development
  • Risk Assessments and Security Roadmap Development
  • Custom Remediation and Program Management

Staffing

check
  • Custom Staff Augmentation
  • Security Staff Co-Sourcing
  • Virtual CISO/CSO
Page 1 of 11
What We Do November 18, 2010