Cyber Security
Penetration Testing To truly understand the security posture of your network, an independent penetration assessment must be performed on a regular basis. Having supported one of the nine national red teams, COLSA understands the intricacies of surveillance and reconnaissance of a network, and finding the vulnerabilities (both known and unknown). Once those vulnerabilities are identified, employing the proper tools to exploit those vulnerabilities in order to give your staff specific identified weaknesses in the network to mitigate. COLSA brings a team of highly skilled and experience penetration planners and testers to give a very real understanding of the weaknesses across your network, and the risks incurred. COLSA will provide a team of skilled personnel to provide recommendations on best practices to mitigate these weaknesses.
Network Security Most IT professionals are trained the art and science of defending their network. Whereas that is important, COLSA's approach to network security is to take a more offensive stance. Network defense will protect your network against Tier I and II threats (HaaS – Hacking as a Service) that can exploit known vulnerabilities. These hackers rely on your lack of your lack of patching, governance or default passwords to 'hack' into your enterprise take what they want and leave. Most of the tools and protection wares on the market today are to react to a breach from this type of threat. In order to protect against a more sophisticated threat (Tiers III/IV), a more cognitive approach to network security must be taken. An analysis of your company's, employees' and vendors' social media presence is required to fully understand the threat landscape.
Mobile App Security Mobile devices are becoming ubiquitous within the organization and can deliver tremendous business value by creating efficiencies, reducing cycle times, and improving communication channels. Companies reporting on mobile device benefits cite increased employee responsiveness, improved worker productivity, improved customer relations, and satisfaction, and reduced inventory and maintenance costs.
Security Benchmarking An independent audit has been and should still be required in order to establish a non-biased baseline for the health and security of your enterprise. However, audits have traditionally been centered on technology, compliance, perimeter defense, and securing the business functions. Those traditional metrics, while still important, do not address the threats of today. Cyber Security audits should be more encompassing to involve people, culture, training, processes, social media presence, and 'trusted vendors' to fully cover the entire threat surface of an organization. By utilizing an extensive history working the DoD and Federal Networks, and implementing the best practices from the Risk Management Framework, COBIT, and NIST, COLSA can provide a comprehensive and affordable audit to benchmark your network across your entire digital eco-system.
Software Assurance Building in security during the development process is obviously the goal of all security professionals; however, it does not always happen. When you are faced with legacy programs, a scan of the code for vulnerabilities, both malicious and non-malicious, is needed. In addition, when you do not have access to the source code, COLSA can analyze the behaviors and reverse engineer the code to find vulnerabilities.
Incident Response COLSA Solutions will help your organization create a proactive plan to quickly identify and respond to a breach of your enterprise. We will work with your C-Suite and IT department to help identify your assets and critical applications needed for business continuity.