Assessment, Policy & Compliance

CipherTechs’ audit division provides a variety of network
assessment and penetration tests, policy and procedure
reviews, as well as forensics services.

Assessments & Pentesting

Network Vulnerability Assessments & Pentesting

Network Vulnerability Assessments provide you with a unique view of your network – through the eyes of an attacker.

Social Engineering Exercises

Our Security professionals will attempt to gather confidential information using the same conventional and unconventional methods employed by recruiters, hackers or industrial spies.

Web Application Assessments & Pentesting

Gain control over web application security by performing a rigorous assessment. We uncover flaws, document and prioritize them, and work with developers to fix them.

Wireless Network Assessments

Engineers assume the role of unauthorized external and authorized internal users attempting to gain access to restricted information and network segments through the wireless network.

Security Review

FIREWALL CONFIGURATION REVIEWS

Identify abnormalities occurring on your network firewalls.

RISK ASSESSMENT

Using field-tested methodologies, identify existing and emerging potential security risks, specifically targeting those that pose the greatest threat to core business goals.

SECURITY SOLUTION CONFIGURATION REVIEWS

Assess the configuration of your organization’s network devices to identify weaknesses in how routers and switches or other devices are configured throughout the network.

Policy & Compliance

PCI QSA

Our Qualified Security Assessors (QSA) are qualified by the PCI Security Council to independently assess compliance to the PCI DSS standard.

Security Compliance & Program Assessments

We conduct Security Compliance Audits including PCI DSS, HIPAA, Sarbanes-Oxley, Gramm-Leach Bliley, ISO 27001 and 27002

Incident Response & Forensic Services

Incident Response Preparation

CipherTechs will evaluate the readiness of an Incident Response Program, identify key areas of needed improvement, and deliver prioritized recommendations aligned with contextual constraints.

Digital Forensics

Obtain and analyze forensic evidence that could be produced as proof in a criminal trial.

RESTORE CONTROL

GET STARTED
Contact CipherTechs

Your Name (required)

Your Email (required)

Subject

Your Message

×
Join our team!

Your Name (required)

Your Email (required)

Subject

Your Message

Upload Resume

×
Contact CipherTechs

Your Name (required)

Your Email (required)

Subject

Your Message

×
Share This