SecureService Delivery Catalogue

Professional Services

Vulnerability and Penetration Testing
  • Regulatory requirements
  • Post implementation Test
  • Quarterly Testing
  • Vulnerability Assessments
Standards Readiness & Implementation
  • ISO 27001
  • NIST CSF
  • SOC2
  • PCI-DSS
  • HIPAA
Risk Management
  • Implementation NIST RMF
  • Risk Program Assessment
  • Individual Risk Assessments
Security Awareness Programs
  • Phishing
  • SMShing
Cybersecurity Governance
  • Programs
  • Assessments
  • Board Training
CaaS
  • CISO as a Service
Cybersecurity Advisory
  • Short Term
  • Medium Term
  • Contract/Retained
Cybersecurity Supply Chain Assessments
Security Operations Center Staffing
Application Security /DevSecOps
  • Program Design
  • Extreme Coding
  • CI/CD Appsec Pipelines
  • Source/Open Source code reviews
  • SAST/DAST Testing
Threat Intelligence
Vendor RFI/RFP Management
  • Vendor Price Advisory
  • RFP/RFI Advisory
Cloud/Container Security Advisory
  • AWS, AZURE, Google
  • Docker, Kubernetes

Consulting Services

Firewalls - Configuration & Mgt
  • Name brad hardware vendors
  • Cloud service firewalls
  • Cloudflare
  • iptables firewalls
Endpoint Security
  • Symantec
  • McAfee
  • Crowdstrike
  • Sophos
  • Trend Micro
SIEM Implementation & Management
  • Splunk
  • Logrythm
  • Alient Vault OSSIM/USM
  • QRadar
IDS/IPS
  • Name brand vendors
UTM Mgt & Configuration
  • Name brand vendors
EDR/MDR/xDR
  • Name brand vendors
Web Application Firewalls
  • Name brand vendors
Cloud Security
  • AWS
  • Azure
  • IBM
  • Google Cloud Services
  • Oracle Cloud
Application Security Tools
  • Name brand vendors
MDM and Mobile Security
  • Name brand vendors
Identity and Access Management
  • Name brand vendors
SOAR
  • Name brand vendors
CASB
  • Name brand vendors
ASK FOR PRICING