Security Advisory and Assessment

[one_half]

[custom_list style=”list-1″]
  • Network Vulnerability Assessment
  • Internal Penetration Assessment
  • External Penetration Assessment
  • Wireless Security Assessment
  • Network Security Assessment
[/custom_list]
[/one_half] [one_half_last]

[custom_list style=”list-1″]
  • Cloud Security Assessment
  • Mobile/BYOD Security Assessment
  • Physical Security Assessment
  • Social Media Security Assessment
  • Social Engineering Security Assessment
[/custom_list]
[/one_half_last] [one_half]

Application Security Assessment

virus-scan-icon150

[custom_list style=”list-1″]
  • Web Application Penetration Assessment
  • Mobile App Penetration Assessment (iOS, Android, HTML5)
  • Product Security and Penetration Assessment
  • Source Code Security Assessment
  • Threat Modeling and Architecture Assessment
  • Application Security Conceptualization and Design
[/custom_list] [/one_half] [one_half_last]

Information Systems Audit

social

[custom_list style=”list-1″]
  • General Controls Review Audit
  • Application Control Review Audit
  • Technical Review Audit
  • Systems and Application Audit
  • Information Processing Audit
  • Systems Development Audit
  • Management of IT and Enterprise Architecture Audit
  • Client/Server, Telecommunications, Intranets and Extranets Audit
[/custom_list]
[/one_half_last]
Advisory, Audit and Assessments February 18, 2013