| Name | Title | Contact Details |
|---|---|---|
Mathieu Vachon |
Chief Information Officer | Profile |
Concerro is a San Diego, CA-based company in the Computers and Electronics sector.
BusinessSKILLS is a Overland Park, KS-based company in the Computers and Electronics sector.
SecurityTrails is a total inventory that curates comprehensive domain and IP address data for users and applications that demand clarity. By combining current and historic data of all Internet assets, SecurityTrails is the proven solution for 3rd-party risk assessment, attack surface reduction and threat hunting. Their powerful API uses real-time data foundations, and lightning-fast data stores to deliver internet assets faster and with greater accuracy. Over 100,000 users globally count on SecurityTrails` fast-detecting products to prevent the next big threat and eliminate any potential blindspots. This includes Fortune 500 companies, top security vendors, and governments. From knowing an organization`s attack surface, shadow infrastructure, and spotting new domains, SecurityTrails makes sure there`s nothing left to be discovered.
ISOMEDIA is a Seattle, WA-based company in the Computers and Electronics sector.
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.