SecureServices Delivery Catalogue
Vulnerability and Penetration Testing
- Regulatory requirements
- Post implementation Test
- Quarterly Testing
- Vulnerability Assessments
Standards Readiness & Implementation
- ISO 27001
- NIST CSF
- SOC2
- PCI-DSS
- HIPAA
Risk Management
- Implementation NIST RMF
- Risk Program Assessment
- Individual Risk Assessments
Security Awareness Programs
Cybersecurity Governance
- Programs
- Assessments
- Board Training
CaaS
Cybersecurity Advisory
- Short Term
- Medium Term
- Contract/Retained
Cybersecurity Supply Chain Assessments
Security Operations Center Staffing
Application Security /DevSecOps
- Program Design
- Extreme Coding
- CI/CD Appsec Pipelines
- Source/Open Source code reviews
- SAST/DAST Testing
Threat Intelligence
Vendor RFI/RFP Management
- Vendor Price Advisory
- RFP/RFI Advisory
Cloud/Container Security Advisory
- AWS, AZURE, Google
- Docker, Kubernetes
Firewalls - Configuration & Mgt
- Name brad hardware vendors
- Cloud service firewalls
- Cloudflare
- iptables firewalls
Endpoint Security
- Symantec
- McAfee
- Crowdstrike
- Sophos
- Trend Micro
SIEM Implementation & Management
- Splunk
- Logrythm
- Alient Vault OSSIM/USM
- QRadar
IDS/IPS
UTM Mgt & Configuration
EDR/MDR/xDR
Web Application Firewalls
Cloud Security
- AWS
- Azure
- IBM
- Google Cloud Services
- Oracle Cloud
Application Security Tools
MDM and Mobile Security
Identity and Access Management
SOAR
CASB