Beruflich Dokumente
Kultur Dokumente
why choose praeTorian Our teams superior technical prowess and business acumen Comprehensive and actionable deliverables, relevant to your organization and stakeholders Our advanced, time-tested and thorough methodologies
Our team delivers business enablement solutions through information security and risk consulting, advisory, and assessment services. Praetorian Professional Services balances the benefits of strategic security consulting with a tactical, hands-on approach to technology consulting and security training. From a strategic standpoint, Praetorian provides enterprise security program consulting that aligns security initiatives with an organizations overall business objectives, corporate governance, and regulatory requirements. From a tactical perspective, Praetorian performs in-depth technical assessments of supporting IT infrastructure and client facing products. As a consultative firm, Praetorian brings many years of experience to the table and our in-depth understanding, technical prowess, and business acumen add significant value in enhancing our clients security posture. Through time-tested, thorough methodologies, our consultants will improve your organizations security posture and maintain risk to an acceptable level.
ready To geT sTarTed? Contact us at 1 (800) 675-5152 to learn how Praetorian security services can help you accomplish your specific business and IT goals, or explore more by visiting: www.praetorian.com
Comprehensive Reporting
Deliverables include comprehensive reporting that is valuable to both the technical and executive levels. For technical staff, we detail the immediate threats across your enterprise and recommend the appropriate responses. For executives, we clearly communicate systemic issues and solutions, prioritizing risk management strategies based on resource constraints and risk goals.
1 (800) 675-5152
www.praetorian.com
Pr aetorian
your world, secured
praeTorian overview / p2
Clients We Serve
we acT as TrusTed advisors who help organizaTional leaders beTTer undersTand and minimize overall risk across iT asseTs, so They can focus on whaT is imporTanT Their core business.
Praetorians expertise and client base spans all major verticals. We regularly provide expertise to Fortune 500 companies across the financial, technology, healthcare, insurance, oil & gas, and manufacturing sectors. Our team is trusted by todays leading organizations, including:
risk managemenT sTraTegies Mitigate risk through security remediation and countermeasures Transfer risk contractually to a third party, or insurance provider Avoid risk by eliminating an existing online or network capability Accept risk based on clear understanding of exposure and organizations appetite for risk
In addition, Praetorian provides considerable consultation to government and education institutions around the United States. Because of our wide range of experience and subject matter experts, several major consulting firms also leverage Praetorian as a trusted partner on an ongoing basis.
1 (800) 675-5152
www.praetorian.com
Pr aetorian
your world, secured
praeTorian overview / p3
did you know that our team is a contributor to nisT sp 800-53 rev 4?
risk management
Enterprise Wide Risk Assessment Application or System Focused Assessments Risk Assessment Framework Development Third Party Risk Assessment
1 (800) 675-5152
www.praetorian.com
Pr aetorian
your world, secured
praeTorian overview / p4
did you know that nathan sportsman, praetorians ceo/founder, is a contributing author to several editions of hacking exposed, the worlds #1 selling book on information security?
application security
Secure Coding Policy Creation Security Requirements Review Threat Modeling Architectural Risk Analysis Source Code Review Application Assessment Web Services Security Assessment Web Application Assessment Mobile Application Assessment
network security
Internal Assessment External Assessment Firewall Assessment VPN Assessment Modem Security Assessment (War Dialing) Wireless Security Assessment Social Engineering Host Security Configuration Assessment Network Architecture Assessment Mobile Security Assessment Physical Security Assessment Virtual Infrastructure Security Assessment
1 (800) 675-5152
www.praetorian.com
Pr aetorian
your world, secured
praeTorian overview / p5
security is everyones responsibility. Transform your team in to responsible stewards of organizational data.
computer-based Training
Fundamentals of Application Security Software Security Awareness Six Fundamentals of Information Security Fundamentals of Secure Development Fundamentals of Secure Database Development Understanding Secure Code JRE, C/C++, Windows, Windows Vista, .NET 4.0, .NET 2.0 Web Vulnerabilities Threats and Mitigations Introduction to Cross-Site Scripting with JSP or ASP.NET Creating Secure Code ASP.NET, C/C++, J2EE, C# Integer Overflows Attacks and Countermeasures Buffer Overflows Attacks and Countermeasures Fundamentals of Secure Architecture PCI Best Practices for Developers OWASP Top 10 - Threats and Mitigations Architecture Risk Analysis and Remediation
Introduction to Security Tools and Technologies Introduction to Cryptography Creating Secure Application Architecture Microsoft SDL for Managers Introduction to the Microsoft SDL How to Define Software Security Requirements and Design SDLC Gap Analysis and Remediation Techniques Introduction to Threat Modeling Attack Surface Analysis and Reduction How to Perform a Security Code Review Fundamentals of Security Testing Classes of Security Defects How to Test for the OWASP Top 10 How to Break Software Security Exploiting Buffer Overflows
1 (800) 675-5152
www.praetorian.com
Pr aetorian
your world, secured