Cyber Defense
Our Blue Team Consultants are dedicated to improving your defenses by selecting the right new controls and helping you get the most out of what you already have through expert engineering and process design.
RANSOMWARE RESILIENCE
We review your ransomware incident response plan and conduct interviews to build an understanding of your process. We then perform a technical review of prevent, detect, respond and restore capabilities.
OT SECURITY
SRA works collectively to create and execute Operational Technology (OT) security programs built on our experience with cross-vertical best practices and technical subject matter expertise.
Threat Hunting
We proactively determine if you have been breached by forensically reviewing your environment for suspicious abnormalities and other IOCs. The SRA Threat Hunting process can use existing EDR and SIEM tools, or we can leverage Windows native tools and open-source platforms.
Epic Security
We use a comprehensive Epic Security Framework spanning Patient Safety, Administration, Application Security and Infrastructure Management to identify gaps in best practice and provide benchmarks.
Table Top Exercises
Strengthen your response readiness by simulating an incident that tests crisis processes and clarifies roles in a cross-functional team exercise
Medical Device Program Dev.
Device Security
We help hospitals, retail, and manufacturers identify and address potential vulnerabilities in the physical, network, operating system, firmware, and application layers.
Security Data Pipeline Modernization
We enable you to capture everything you need, reduce ingestion cost, and gain the flexibility to change your detection platforms when you want.
closed accordion item
Ransomware Resilience
We review your ransomware incident response plan and conduct interviews to build an understanding of your process. We then perform a technical review of prevent, detect, respond and restore capabilities.
OT Security
SRA works collectively to create and execute Operational Technology (OT) security programs built on our experience with cross-vertical best practices and technical subject matter expertise.
Threat Hunting
We proactively determine if you have been breached by forensically reviewing your environment for suspicious abnormalities and other IOCs. The SRA Threat Hunting process can use existing EDR and SIEM tools, or we can leverage Windows native tools and open-source platforms.
Epic Security
Perform an in-depth review of your Epic Systems security controls. Identify vulnerabilities in the Epic deployment and gaps in the processes that govern the platform’s use. Identify practical recommendations to remediate weaknesses and benchmark against similar organizations.
Device Security
Multi-faceted device/IoT security testing, with the goal of identifying potential vulnerabilities in device security design at the physical, network, operating system, firmware, and application layers. SRA has expertise in helping device manufacturers to produce secure products and minimize the risks associated with their use.
Table Top Exercises
Strengthen your response readiness by simulating an incident that tests crisis processes and clarifies roles in a cross-functional team exercise.
Medical Device Program Development
A robust Medical Device Security Program must be driven by a sound governance model and thoughtful strategy. Develop a roadmap to build your device security program and mature the capabilities of the program over time.
Security Data Pipeline Modernization
We enable you to capture everything you need, reduce ingestion cost, and gain the flexibility to change your detection platforms when you want.
Want to your improve testing, detection, and response capabilities?
Discover Purple Teams with VECTR™