Network Security & Computer Forensic Services

CDI has a wide range of cyber security service offerings. Let us help ensure the highest quality information security for your organization.

Network and Website Vulnerability Assessments and Penetration Testing

Internal and External Network Vulnerability Assessments identify detailed security flaws that exist on your network devices (PC’s, servers, laptops, firewalls, switches, etc.) that can allow a hacker to gain access to your confidential or critical information. Our scanning process provides the level of detail and the specific remediation steps required to fix each device that exhibits a security flaw. Our vulnerability assessment reports prioritize security flaws and several types of reports are generated that meet the needs of executives and the network administrators required to remediate.

Web Application Security Assessments Including Application Vulnerabilities and Malware Detection Services

Web Application Scanning (WAS) brings web application security to a new level that includes unique capabilities – including accurate discovery and cataloging of web applications, identification of vulnerabilities and remediation paths, helping companies proactively secure their web applications. Malware Detection Service (MDS), provides year-long scanning of their web sites for malware, providing automated alerts and in-depth reporting to enable prompt identification and resolution. MDS enables organizations to protect their customers from malware infections and safeguard their brand reputations.

Penetration Testing

Penetration testing is a primarily manual process by a CDI ethical hacker to attempt to gain access to an organizations information systems (internal or external) that contains proprietary or confidential information. We assume the role of a malicious hacker and may actually break in without actually causing any damage or stealing any information. The goal of penetration testing is to determine if your systems can be broken into, how they can be broken into, and specify what
fixes need to be applied to prevent a breach.  

Comprehensive Security Control and Compliance Assessments

If your organization is subject to a security regulations and audits by regulatory bodies (HIPAA, PCI, SOX, ISO, etc.), then you may want to consider getting your house in order prior to a formal audit. CDI provides comprehensive security control and compliance assessments covering each aspect of an applicable regulatory compliance standard to help organizations prepare to meet compliance standards and avoid compliance penalties and short mandated deadlines for remediation.

Security Policy Creation

 Cyber Defense Institute can create a comprehensive information security policy for your organization that complies with industry regulations (HIPAA, PCI, SOX, etc.) and helps ensure that your organization’s confidential or proprietary information is safe and secure. CDI can also update or enhance existing policies to include such areas as mobile devices and BYOD.

Breach Response Services

In the event of an information breach, CDI’s emergency response team can assist in containment
and identification of the breach and provide direction as to the appropriate response to the breach. Breach services include incident/breach response policies and drills, forensic services, breach notification plans, containment and remediation services, and breach cost estimation for insurance purposes.

Risk Assessments and Risk Management

The first step in meeting security compliance standards (HIPAA, PCI, SOX, etc.) and determining the security strategy for your organization is the completion of a formal risk assessment. Risk assessment is a formal, detailed process of identifying your organizations information assets and determining the type and level of risk to these assets. CDI’s comprehensive risk assessment methodology ensures that your organization will be in compliance with applicable security regulations and be able to prioritize and manage risk in a logical manner.


Computer Forensic Services

Cyber Defense Institute can assist your organization in all facets of Computer Forensics (evidence extraction, preservation, and presentation) and ensure that evidence does not become tainted in the process. Our forensic investigators can assist your organization with:

  • Computer and Network Forensics
  • E-Mail and Database Forensics
  • Handheld and Mobile Devices Forensics (iPhone,Laptop)
  • Forensic Analysis, Reporting and Expert Witness Testimony
  • Evidence Handling and Processing


Wireless Security and Performance Assessments

CDI’s wireless security and performance assessments helps IT staff detect security threats and wireless network vulnerabilities. Our Wi-Fi Analyzer® is able to detect dozens of wireless security issues including intrusions, hacking attempts, rogue devices, stumbler tools, devices sending unencrypted data, and bad security configurations. We are able to generate sophisticated easy to understand reports covering all areas of wireless management including RF statistics, channel reports, device reports, security performance reports and compliance reports for most regulatory standards including HIPAA, PCI, SOX and more. Reports provide a step by step pass/fail assessment of each section of the standard.


Threat Monitoring as a Service

No company wants to experience a data breach but it happens all the time. While larger companies can often weather the financial and PR storms associated with a breach, the average small business closes their doors within 6 months of a cyber-security incident. What’s worse is that a vast majority of breaches are active within the network for months or years before detection – the only thing missing in these cases was a security expert looking for the evidence of a compromise.

Let skilled security experts keep watch over the activity on your network. By applying cutting-edge SIEM (Security Information and Event Management) technology and established threat intelligence, suspicious activity and security incidents on your network can be identified and remediated as they occur.

Have a question? Want to learn more about how we can help?