Project Management-01.png

COMPLIANCE AND SECURITY ARE NOT SYNONYMOUS


Highlights

  • IT Risk Internal Network Technical Assessment
  • Web Application Technical Assessment
  • Network Penetration Testing
  • Web Application Penetration Testing
  • Data Breach Simulation
  • Ransomware Simulation
  • Phishing & Spearphishing Simulation
  • Distributed Denial of Service Simulation
  • Quality Assurance for Threat Protection Services
  • Employee Education

EXCEL has partnered with eVAL to provide a range of offensive and defensive security solutions catered to many regulated industries. Our security roots stem from Application Security and Secure Enterprise Web Software Development. We work with companies that want to improve their overall security posture, in addition to conforming to industry specific compliance requirements, on a consultative basis.

TECHNICAL ASSESSMENTS

A comprehensive Vulnerability Assessment from the internal/external network is just the start. Our security experts work with you to identify vulnerabilities that actually pose a risk to your business, develop NIST SP 800-53 SI based policies, procedures and guidelines to mitigate risk, and improve the security of your IT systems and Human Capital.

PENETRATION TESTING

EXCEL’s Penetration testing uses a covert “assumed compromise” offensive attack levied at IT infrastructure, internal staff, and decision makers—commonly referred to as a “black-box” approach. This methodology closely models legitimate attacks by real-world Threat Actors and Advanced Persistent Threats. The goal is to establish persistence within the network and compromise as many high-value targets through active exploitation as quickly as possible, while avoiding detection, and meeting other purpose specific goals identified through a co-operative effort between our consultants and your internal leadership.

THREAT SIMULATION AND VULNERABILITY ASSESSMENT

EXCEL utlizeds a variety of techniques to simulate and assess threats to your IT infrastructure, including Data Breach, Ransomware, Phishing, DDoS attacks. We’ll analyze the results and recommend industry-leading vulnerability scanning solutions. 

SECURITY MANAGEMENT SERVICES

EXCEL offers both managed and incident response services with 24/7/365 coverage, including Linux/BSD Server Management, Web Application Management, Secure Managed Wifi, and Endpoint Security services.