top of page

LATEST PROJECTS

OWASP-web-application-firewall-e1551796764174-696x393-3166973411.jpg

Project | 1

Safeguard | Application Perimeter Security

As part of an enterprise initiative to secure multiple new private clouds and the customer served applications, there was a requirement to implement a next-gen Web Application Firewall. After careful evaluation of several vendors, a decision was made to choose a company that blends technology and next-gen analytics that was superior to current WAFs. Extensive application testing was performed, and implementation was completed ahead of schedule.

5e38a8ff36abc654a0262c3a_website-vulnerability-scanning-1236805405.jpg

Project | 2

Implement | Vulnerability Management

The organization was stifled by inaccurate vulnerability intelligence which led to issues ranging from unreliable information to execution conflicts. As the enterprise expanded, it became evident that the current platform was not effective. Evaluation of best of breed solutions was commenced and a solution that met key criteria including accuracy, agility, efficiency and low maintenance was chosen. The organization gained a guarantee of integrity of the data while keeping OpEx at previous levels.

th-3608774378.jpg

Project | 3

Design | Cloud Security Engineering

Creation of a standard build and security requirements foundation that applies to all clouds regardless of type (SaaS, IaaS, PaaS).  Fundamental design requirements include encryption, data security (isolation), defined access and security policies, threat management, auditing, privacy controls and maintenance and management controls to ensure that the clouds are secure.

Project | 4

Operate | Vulnerability Remediation Process

Redesign the construct of external and internal vulnerability remediation through implementing a highly scalable solution that doesn't rely on scheduled scanning but rather cloud agents to alert instantly of security issues at the host and container level. The solution also provides an up-to-date inventory of all devices in the enterprise.

container-100579502-primary.idge.jpg

Project | 5

Control | Containerization Security

Ensure the deployment, rules and management oversight from hypervisor to application distribution is secured. This effort encompassed scrutinizing security from the orchestration and control of containers and how they interact in the environment. Monitoring and policy enforcement and implemented to meet company, as well as, audit and compliance requirements.

To see more or discuss possible work let's talk >>
bottom of page