Software & Mobile Security

Secure mobile devices such as smart phones, tablets and laptops as well as the applications that supply data to these devices. • Certificate of Attestation • Code Review Assessment • Application Security Assessment • Mobile Application Pen Test • Mobile Device & Policy Security Assessment • Threat Model Assessment • Secure Software Development Life Cycle (SSDLC)

Network Security & Social Engineering

Safeguard information to ensure its integrity and confidentiality on your network and in the cloud. Cylance Consulting can also help you identify security vulnerabilities with those that handle that data. • Network Security Certification & Attestation • Cloud Security Assessment • Internal Penetration Testing • External Penetration Testing • Firewall, VPN & Network Architecture Security Assessment • Product Pen Testing Assessment • Host Penetration Testing • Wireless Security Assessment • Physical Security Assessment • Social Engineering.

Governance, Risk & Compliance (GRC)

Identify, remediate, monitor and manage security risks and build strategies that support your business objectives and are consistent with applicable regulations. • Security Governance & Program Development • Risk Assessment & Security Roadmap Planning • ISO27002 Policy Gap Analysis • Compliance Gap Analysis • Custom Remediation & Security Project Management Services • Custom Staff Augmentation Services • Security Staff Co-Sourcing

Consulting Resources

Healthcare Case Study off Healthcare Case Study on Healthcare Case Study Read MoreRead More Web App Pen Test Assessment off Web App Pen Test Assessment on Web App Pen Test Assessment Read MoreRead More Social Engineering Assessment off Social Engineering Assessment on Social Engineering Assessment Read MoreRead More Physical Security Assessment off Physical Security Assessment on Physical Security Assessment Read MoreRead More Wireless Pen Test Assessment off Wireless Pen Test Assessment on Wireless Pen Test Assessment Read MoreRead More Internal Pen Test off Internal Pen Test on Internal Pen Test Read MoreRead More External Pen Test off External Pen Test on External Pen Test Read MoreRead More ISO 27002 Gap Analysis off ISO 27002 Gap Analysis on ISO 27002 Gap Analysis Read MoreRead More Source Code Review off Source Code Review on Source Code Review Read MoreRead More NIST Cybersecurity Framework Gap Analysis off NIST Cybersecurity Framework Gap Analysis on NIST Cybersecurity Framework Gap Analysis Read MoreRead More

Comprehensive Security Solutions by Industry