We have assisted many product and application vendors in demonstrating their commitment to security not only to their management but also to their clients. Such engagements normally span multiple phases, including:
- Threat Modeling
- Penetration Testing (network & application)
- Architecture Reviews
- Source Code Reviews
- Server Configuration Reviews
We also support you in any post-assessment communications necessary to help present the strongest security posture of your solution to your customer.
Enterprise Mobile Security Strategy
Companies can no longer ignore the growing demand for diverse mobile devices (e.g. iPhones, iPads, Android phones) in the work place, and it is a complex task to understand and evaluate security concerns around these products. Intrepidus Group can guide you through the process of determining your organization's risk tolerance for your data and identifying appropriate security controls on the array of current mobile devices in use by today's mobile workforce. This includes policies and procedures for mobile email access, document repositories, password and device encryption, lost or stolen devices, device deprovisioning, and general device security settings. Intrepidus Group prides itself in taking a product and vendor agnostic approach to give an unbiased view on current marketplace solutions.