
CYBER SECURITY
We make cyber security solutions intelligent and purposeful for today's leading organizations
RedSec1 works with its clients and industry partners to design, build, and deploy innovative solutions to address situational awareness, enterprise resiliency, and threat-based defensive posturing. RedSec1 recommends a sensible security posture that unifies proven cyber security approaches with an emphasis on using cyber threat intelligence to create autonomous solutions that respond and adapt quickly to cyber attacks. Below are the four critical areas we focus upon when engaging with our clients. Bottom line: Enterprise-scale cyber security solutions using advanced technologies to protect people, data, applications, and networks.
SITUATIONAL AWARENESS (SA)
Security begins and ends with having a clear picture of the state of your assets and the dependencies on those assets. Security teams, and executives, must have an appropriate level of SA to protect infrastructure, maintain core operations, and protect sensitive information.
ENTERPRISE RESILIENCY (ER)
External and internal threats make security breaches inevitable. As a result, enterprises must have solutions and technology in place to allow operations to continue when confronting a cyber attack.
COMPLEXITY MANAGEMENT (CM)
Infrastructure as we know it continues to evolve and grow more complex. Cloud and hybrid infrastructures combined with the rapid adoption of IoT and handheld devices has led to convolution of infrastructure components—and more data.
THREAT-BASED OPTIMIZATION (TBO)
Reducing the likelihood of any attack is priority number one. Focusing on this priority requires experience, knowledge, and understanding of the techniques and tactics used by adversaries.
Summary of experience
Host Based Security System
Security Compliance Configuration and Validation
Secure Configuration Remediation
Insider Threat Focused Observation Tools
Public Key Infrastructure
Enterprise/Global/Joint Directory Services
Cross-Domain Data Guards
Global Content Delivery Service
GRC Continuous Monitoring Program
Automation of Technical Controls Assessments (DISA STIG and CIS Benchmark compliance checks)
Enrichment of Vulnerability Scan Findings via Network Security Posture Ratings (network accessibility, threat exposure, and downstream risk)
Custom Developed Vulnerability Risk Scoring Capabilities
Multi-Factored Risk Score Calculations