Cybersecurity Domains

Governance, Risk & Compliance

  • ISO 27001 / HIPPA / PCI SOC

  • Firewall Compliance

  • Physical & Logical Reviews

  • Configuration Compliance

  • Audit & Compliance Analysis

Mobile Security

  • Authentication & Onboarding

  • Rogue Access Point Detection

  • Wireless Security Protocols

  • OWASP Mobile Top 10

  • Automated Mobile App Scanning

  • Dynamic Mobile App Analysis

  • Secure Coding Practices

  • Mobile Pen Testing

  • Secure Code Review

Application Security

  • Secure Code Review

  • Application Pen Testing

  • Vulnerability Validation

  • Secure Coding Practices

  • Web App Firewall

  • Web App Security

  • OWASP Top 10 / SANS CWE Top 25

  • Database Activity Monitoring

  • Content Security

  • Secure File Transfer

Network Security

  • Firewall Management

  • Network Access Control

  • Secure Network Design

  • Unified Threat Management

  • Remote Access

  • IDS/IPS

  • Pen Testing

Data Security

  • Data Encryption

  • Data Leakage Prevention

Infrastructure Security

  • DNS Security

  • Mail Security

  • Unified Communications

  • SIEM (Security Info & Event Mgmt)

  • Log / False Positive Analysis

  • Zero-Day Vulnerability Tracking

Advance Threat Protection

  • Botnet Protection

  • Malware Analysis & Anti-Malware

  • Sandboxing / Emulation

  • Application Whitelisting

  • Network Forensics

  • Automated Security Analytics

System Security

  • Windows/Linux Server Security

  • Vulnerability & Patch Management

  • Automated Vulnerability Scanning

Last updated