Service Offering

Security Consult

The no fee, Security Consult identifies gaps that pose risk to your organization. 

Discovery of security defenses, and existing processes and procedures are documented. Other areas of discussion include your organizations regulatory compliance requirements

Shortly following the meeting, a brief written summary with areas of consideration is provided.

Incident response

The goal of Incident Response is to remediate the impact of a security incident as rapidly as possible.

A free consult will be provided to determine the scope of the security incident as well estimated labor hours required.

On completion of the engagement an out brief will be provided to executive management if requested.

Cyber Defense Health Check

The Cyber Defense Health Check assessed the health of existing defenses.

The review leverages documentation from the Security Consult and provides an audit of existing defenses, backup and recovery procedures, and internal processes and procedures.

The billable Defense Review will require 12 to 24 hours onsite.  A report documenting findings and recommendations will 48 hours after the visit.

Solution deployment

FIDERE SYSTEMS LLC will deploy the appropriate solutions to eliminate gaps in your existing defenses.

We will design and deploy solutions to identified areas of risk. Solution areas include Endpoint Protection, Discovery and Response, Data Protection, Network Protection and Security and Information and Event Management.

Engagement includes a Statement of Work and Acceptance Requirements criteria on completion.

Security Assessment

The Security Assessment evaluates the effectiveness of existing defenses.

Areas of assessment include Vulnerability and Compliance Assessment, Penetration Testing, Social Engineering, and Admin Account auditing to name a few.

The length and duration of the assessment depends on the scope of the engagement.

managed security services

Managed Security Services extracts you from the day-to-day operational aspects of monitoring your endpoint and network security.