6
Security The Connection That Matters Most Protect your business from security threats with Pearl Technology

Protect your business from security threats with Pearl ... · Global Information Assurance Certification Certified Penetration Tester (GIAC GPEN): Includes penetration-testing (or

Embed Size (px)

Citation preview

Security

The Connection That Matters Most

Protect your business from security threats with Pearl Technology

309.679.0320 | pearltechnology.com/security

Committed to Your Future When it comes to your business, security can mean many things. But to us, it means trust and reassurance in your business’s future—from keeping your business running, to keeping confidential employee and customer information safe.

Pearl Technology will take care of potential security threats, so you can run your business worry-free.

We don’t just say we’re security experts; we prove it. Our team of network security analysts are highly qualified in their craft, holding a number of certifications. Our certifications include:

Certified in IT

These certifications allow us to protect your business from every side, from risk management to incident response plans.

Certified Information Systems Security Professional (CISSP): The most globally recognized standard of achievement in the IT industry to design, engineer, implement, and run an information security program.

Global Information Assurance Certification Certified Forensic Analyst (GIAC GCFA): Provides the knowledge, skills, and ability to conduct formal incident investigations and handle advanced incident handling scenarios, such as data breach intrusions and digital forensic cases.

Global Information Assurance Certification Certified Penetration Tester (GIAC GPEN): Includes penetration-testing (or ethical hacking) methodologies, the legal issues surrounding penetration testing, and how to properly conduct a penetration test to find vulnerabilities.

Palo Alto Networks Certified Network Security Engineer (PCNSE): Provides a deep understanding on how to design, install, configure, maintain, and troubleshoot most Palo Alto security products.

Committee on National Security Systems (CNSS-4011): Provides the required training for information systems security professionals for telecommunications and automated information systems security.

Cisco Certified Network Associate Security (CCNA Security): Validates associate-level knowledge and skills required to secure Cisco networks.

CompTIA Security+: Includes the essential principles for network security and risk management.

Basic CertificationsTip: Don’t pick an IT company without these essential certifications.

Top-tier CertificationsThese are some of the top certifications an IT company can maintain, and we have them all!

If you want to defend your business from expensive and reputation-damaging cyberattacks, you need someone who can navigate the complexities of cybersecurity.

Pearl Technology provides that service and more.

Our CISO program combines risk and compliance assessments, security awareness classes, vulnerability scanning, forensic analysis, breach response, and penetration testing (or ethical hacking) to help ensure your business is compliant and secure.

Benefits of our CISO program:

1. Experience: Our security analysts have acquired a number of certifications in order to provide your business with the protection it deserves.

2. Affordability: Hiring a full-time CISO and security team could cost over 200k. With Pearl Technology, you get a security team with over 20 years of experience at a fraction of the cost.

3. Peace of Mind: With our programs in place, the chances of a breach are greatly reduced. If an incident were to occur, you have a team that has a process in place to remediate the issue.

Chief Information Security Officer (CISO) Program

CISSP GIAC GPEN

CNSS 4011 &/OR SECURITY+

GIAC GPEN &/OR CISSP

GIAC GCFA

PCNSE &/OR CISCO CCNA SECURITY

GIAC GPEN

PHISHING TESTING

SECURITY AWARENESS

TRAINING

RISK ASSESSMENT

FIREWALL CONFIGURATION

AND HARDENING

PENETRATION TESTING

BREACH/ INCIDENT RESPONSE

VULNERABILITY SCANNING

309.679.0320 | pearltechnology.com/security

Our Services Risk Assessments: Where most IT firms only offer an off-the-shelf, appliance-based assessment, we administer a detailed risk assessment that’s recommended by the Center for Internet Security (CIS). Our CISSP security analysts assess vulnerable, real-time risks to your operating systems, software, and networks to provide recommendations for a secure network.

Phishing Exercises: We'll test your employees' ability to recognize email scams by simulating successful real-life phishing attacks. Then, we'll get your team together to discuss the results.

Security Awareness Training: We've developed a security training and awareness class designed for businesses like yours. In just 60 minutes, we'll teach you and your staff to recognize cyber risks.

Vulnerability Scanning: We’ll identify different avenues into your network to expose breach vulnerabilities. Scanning regularly helps ensure your network is protected against the latest cyber threats.

Breach/Incident Response: Our certified forensic analyst knows what to do in case of a suspected breach. We will also help you create an incident response plan for any future breaches. When we're done, you'll know exactly what to do and who to call when a breach occurs.

Footprinting: Before they attack, hackers use footprinting to gather publicly available information about your business and its computer systems. We will footprint your business to help you find important information before a hacker does.

Firewall Configuration and Hardening: A default firewall setup can be unsecure. We review your firewall configuration and set it up to best practices standards, which helps ensure no unauthorized access or vulnerabilities have developed within your network.

Penetration Testing: A penetration test is carried out by our team of ethical hackers. We'll simulate a real-world attack on your network, applications, devices, and employees to determine your vulnerabilities.

172646

The Connection That Matters Most

Visit: 1003 E. Toledo Ave. Peoria Heights, IL 61616

Email: [email protected]

Call: 309.679.0320

Engage: pearltechnology.com/security

Connect with us.