Name: Secure StateAddress: 23340 Miles Road, Suite C
Email: [mailto:firstname.lastname@example.org email@example.com]
Web: [www.securestate.com www.securestate.com]
Contact: Ken Stasiak
No matter what industry your organization is in, the more advanced technology becomes the more solid your information security program must become as well. At SecureState, we pride ourselves on a best value, best practices approach to testing and strengthening a business’ information security protection. We offer a wide array of services that not only check for vulnerabilities but also provide solutions to security challenges. These services can be packaged to limit costs without sacrificing thoroughness.
SecureState believes in hiring the most qualified information security professionals in the country. Most of our employees have backgrounds or experience in Military Intelligence, Big X Consulting, and various law enforcement entities. We are well versed on the latest methods used to breach security and up-to-date on the latest techniques and tools to mitigate it. ,SecureState client testimonials case studies, and awards speak to our expertise.
SecureState is the security expert offering services in: penetration testing, audit and compliance, business preservation, and all areas of risk management. We have been in business for over 10 years and have experience with all types of businesses industries, and government agencies.
If building or assessing your information security program, please call your security team at 1-800-903-6264 or visit www.securestate.com.
Contents 1 Penetration Testing 2 Audit and Compliance 3 Business Preservation 4 Risk Management 5 External links 6.1 Share this page
SecureState’s profiling team offers penetration testing assessments, which find more vulnerabilities than scans. We can find your information security risks through:
• Internal Attack and Penetration Testing - an attack within your business by an employee, contractor, or other worker. • Physical Penetration Testing – a security breach of the building or grounds. • Social Engineering - Outsider getting information from an employee with the purpose of using it maliciously. • External or Internet Penetration Testing - data security breaches, which include web applications, firewalls, hosts, networks, etc. • Wireless Penetration Testing – an attack by a hacker via your wireless infrastructure.
Services can range from offensive to hard core defensive. The ethical hacking techniques can be Black Box (no prior knowledge of infrastructure), Grey Box (some knowledge of infrastructure), and White Box (basic testing with complete knowledge of infrastructure).
SecureState has developed our process to provide testing quickly with little to no effect on your day-to-day operations.
Audit and Compliance
SecureState’s Audit and Compliance Team is comprised of experts in security frameworks and regulatory compliance standards. SecureState’s team has the knowledge and skills to assist you in achieving necessary compliance and help you in building compliance into your information security program.
SecureState’s expertise includes comprehensive knowledge of industry frameworks such as:
• National Institute of Standards and Technology (NIST) – a standard for business and technology • ISO 27000 series (ISO 27001) – the security standard • Information Technology Infrastructure Library (ITIL) – the security management standard
SecureState’s expertise includes comprehensive knowledge of regulatory compliance standards such as:
• HIPAA Compliance (Health Insurance Portability and Accountability Act) • GLBA Compliance (Gramm-Leach-Bliley Act for finance service organizations) • PCI Compliance or PCI DSS Compliance (Payment Card Industry Data Security Standard to protect cardholder data) • SOX Compliance (Sarbanes-Oxley Act of 2002 for accounting controls against fraud) • Technical Guide (TR-39, formerly known as TG-3 for Personal Identification Number or PIN security) • NERC CIP Compliance (North American Electric Reliability Corporation Critical Infrastructure Protection Standard for energy company cyber security)
Whether your business is in the healthcare, financial, educational, customer service, food service, critical infrastructure, entertainment, professional or government industries, our vast knowledge is invaluable when it comes to building or assessing your information security system according to the necessary audit and compliance requirements.
Through the use of our readiness and response services, SecureState’s team of Business Preservation Services team of experts can assist your organization. From leveraging your readiness to responding to a data security breach, we can partner with your organization as your vulnerability management team throughout your security lifecycle.
Our response investigative techniques include computer forensic analysis, if necessary.
SecureState’s Risk Management Team works to build or improve your information security program. From strong security policy and procedure development to network segmentation, SecureState’s Risk Management Team provides the guidance and direction to ensure your organization’s security.
External links SecureState Website