Asset and Vulnerability Management

Maintaining your assets with the latest software releases and defending against threats is paramount in the effectiveness of any information security program. We help develop and implement controls, policies, and procedures to identify and remediate vulnerabilities in your environment.

  • Continuous vulnerability scanning and reporting
  • Patch management orchestration
  • Strategies for targeted remediation

 

Web Application

  • OWASP Top 10 Most Critical Web Application Security Risks
  • Automated and manual risk identification
  • Data Layer Access Analysis
  • Web Hosting Configuration Review

 

Network

  • Architecture Analysis and Monitoring Recommendations
  • Vulnerability Scanning and Remediation
  • Configuration Gap Analysis

 

Physical

  • Electronic key card access systems, e.g. HID Proxcards
  • Radio frequency and proximity-based access controls, e.g. gate/garage control systems, automobiles, marine vehicles, electronic safes
  • Physical controls, e.g. keyed locks, fences, motion sensors