HOME    ABOUT    NEWS    SERVICES    PRINCIPLES    KNOWLEDGE    CAREERS    CONTACT
Application    Infrastructure    Supply Chain
Our Approach
We endeavor to understand the business process surrounding technology in order to most effectively assess security and provide useful results. Your business is not cookie-cutter; neither should be your security assessment.

Security is most effective as an ongoing process; it does not stop with a report, and we're not satisfied until your product or network is verified to be secure.
ASSESSMENT STAGES

Design

Implementation

Iteration

 
OPTIONS

v(C)ISO

Catered Threat Feed

Incident Response

 
SUPPLY CHAIN

Vendor Assessment

Vendor Management

Vendor Accreditation

 
ADDITIONAL SERVICES

System Hardening

Security Training

Compliance/Accreditation

 
Contact Us
Experts in
Cryptanalysis
Protocol Analysis
Documentation Review
System Architecture
Network Architecture
Authentication
Digital Rights Management
Content Protection
Vendor Awareness
Network & System Awareness
Policy Review & Development
Long Term Planning
Trust Modeling & Verification
Defense-in-depth Strategy
Insider Threat Assessment
Fuzzing
Hacking
Source Code Review
Vulnerability Assessment
Penetration Testing
Malware Analysis
Configuration Assessment
Rouge Device Identification
System Hardening
Policy Testing
Social Engineering
Design Verification

Copyright 2005-2013 Independent Security Evaluators, LLC. All rights reserved.