© 2010 U.S. Cybersecurity, LLC. All rights reserved.
One World Trade Center, 121 SW Salmon Street, Suite 1100, Portland, OR 97204 | |
Information Assurance Services
Information System Vulnerability Assessments
Quickly discover and scan all network assests and associates vulnerablities.
Easily priotize vulnerabilities, policy violations and remediation efforts.
Defend your network and comply with all regulatory compliance mandates.
Install an automated security testing and measurment solution that allows you to continuously & proactively assess the security or your network.
Infortmation System Regulatory Compliance Audits
Enabling compliance with industry regulations has become a core function of information security. Regulations such as Gramm Leach Bliley (GLBA), the Payment Card Industry's (PCI) security standard, the Health Information Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX) and NERC's Critical Information Protection (CIP) Standards all mandate that organizations implement the appropriate controls to protect critical information.
USCys provides SAS 70 level regulatory audits to insure that your systems meet all mandated compliance requirements.
Information System Security Engineering Services
More than ever, governments, businesses, and industries depend on safe and secure information systems to perform mission-critical functions. It is essential that cyber-security plays an important role in the life cycle of key systems—from inception to decommissioning. By treating security as an integral part of the design and development phases of a new system, you not only ensure the security of the implemented system, but you also eliminate the expensive retrofit of security into a system after it is completed.
Using a logical and physical converged security approach, USCys specilaizes in Security Information & Event Management (SIEM), Deep Packet Inspection, 802.11 security and Cloud Sercuity solutions.
Information System Penetration Testing
While many companies perform vulnerability scans of their networks and computing platforms, many never know if an attacker could actually exploit the vulnerabilities discovered in the process. Compounding the problem is the fact that most companies do not have staff with the specialized expertise required to adequately test systems without incurring a potential business operations impact.
Penetration Testing Services (PTS) are a key component to any comprehensive information security program. Performed by trained security engineers and utilizing industry best practice test methodologies, our PTS target systems where weaknesses reside. We efficiently determine if a potential vulnerability is truly exploitable and if it could lead to the compromise of sensitive corporate data.