| Name | Title | Contact Details |
|---|
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.
Aurora COnsulting Group is a East Aurora, NY-based company in the Computers and Electronics sector.
Enterprise Information Solutions, Inc. is a Downers Grove, IL-based company in the Computers and Electronics sector.
Gene Security Network is a Redwood City, CA-based company in the Computers and Electronics sector.
Risk Based Security (RBS) provides detailed information and analysis on Data Breaches and Vulnerability Intelligence. Our products, Cyber Risk Analytics (CRA) and VulnDB, provide organizations access to the most comprehensive threat intelligence knowledge bases available, including advanced search capabilities, access to raw data via API, and email alerting to assist organizations in taking the right actions in a timely manner. In addition, our YourCISO offering provides organizations with on-demand access to high quality security and information risk management resources in one, easy to use web portal. Risk Based Securitys blend of dedicated research and technical expertise, data breach analytics, vulnerability intelligence, cyber liability insurance experience, and real world management experience enables us to provide clients with meaningful and cost-effective security solutions. We work with organizations to understand the real risks their organizations face, to ensure they implement, not just security, but the right security