Cyber Defense

Our “Blue Team” Consultants are dedicated to improving your defenses by selecting the right new controls and helping you get the most out of what you already have through expert engineering and process design.

Threat Hunting

We proactively determine if you have been breached by forensically reviewing your environment for suspicious abnormalities and other indicators of compromise. The SRA Threat Hunting process can use existing EDR and SIEM tools, or we can leverage Windows native tools and open-source platforms.

Device Security

We help hospitals, retail, and manufacturers identify and address potential vulnerabilities in the physical, network, operating system, firmware, and application layers.

Epic Security

We use a comprehensive Epic Security Framework spanning Patient Safety, Administration, Application Security and Infrastructure Management to identify gaps in best practice and provide benchmarks.

Table Top Exercises

Strengthen your response readiness by simulating an incident that tests crisis processes and clarifies roles in a cross-functional team exercise

Medical Device Program Dev.

A robust Medical Device Security Program must be driven by a sound governance model and thoughtful strategy. Develop a roadmap to build your device security program and mature the capabilities of the program over time.
closed accordion item
Threat Hunting

We proactively determine if you have been breached by forensically reviewing your environment for suspicious abnormalities and other indicators of compromise. The SRA Threat Hunting process can use existing EDR and SIEM tools, or we can leverage Windows native tools and open-source platforms.

Tell Me More!

Device Security

Multi-faceted device/IoT security testing, with the goal of identifying potential vulnerabilities in device security design at the physical, network, operating system, firmware, and application layers. SRA has expertise in helping device manufacturers to produce secure products and minimize the risks associated with their use.

Tell Me More!

Epic Security

Perform an in-depth review of your Epic Systems security controls. Identify vulnerabilities in the Epic deployment and gaps in the processes that govern the platform’s use. Identify practical recommendations to remediate weaknesses and benchmark against similar organizations.

Tell Me More!

Table Top Exercises

Strengthen your response readiness by simulating an incident that tests crisis processes and clarifies roles in a cross-functional team exercise.

Tell Me More!

Medical Device Program Development

A robust Medical Device Security Program must be driven by a sound governance model and thoughtful strategy. Develop a roadmap to build your device security program and mature the capabilities of the program over time.

Tell Me More!

Want to your improve testing, detection, and response capabilities?

Discover Purple Teams with VECTR™