With each security project it becomes more apparent that there is no silver bullet to protect an organization from a cyber-attack. At Coquina, we tailor each of our security solutions to the business needs of your clients. Our services provide measurable data, efficient processes and the mitigation strategies needed to remain secure.
We can help protect your clients’ environment and fight the malicious threat by:
• Providing various methods of security testing
• Improving the overall security position
• Create an end-to-end approach to security management (cloud, multi-cloud, on-premise)
• Combat trends and techniques and defend against common threats
We help reduce risk through consulting, services and product expertise and work as a trusted advisor for all cyber security initiatives.
Our Security Assessment Service is an explicit study of an IT environment to locate vulnerabilities, risks and preparedness. We analyze existing security controls and assess their ability to remediate vulnerabilities and recommend steps to lower the risk of future attacks.
• Determine information value (short- or long-term impact of information being lost or stolen)
• Identify and Prioritize Assets (trade secrets, electronic data, office devices)
• Identify Threats (data leaks, insider threats, service disruption)
• Identify Vulnerabilities (software analysis, audit reports, incident reports)
• Calculate Likelihood and Impact (scenario review, cost of impact)
• Prioritize risks (cost of prevention vs. information value)
• Document results (risk assessment reporting)
• Assessment report (recommended security control changes)
Our Penetration Testing Service (also known as a pen test) is a simulated cyber-attack against a client’s computer systems to check for exploitable vulnerabilities. Our team of certified, Cybersecurity Experts will perform “ethical hacking” to identify weaknesses that could be exploited. We identify vulnerabilities and misconfigurations in your cloud platforms, networks, and applications as well as provide you with the real-world business impact of those issues.
• Cloud security testing (AWS, Azure)
• Network penetration testing (internal and external)
• Dark web and open-source intelligence
• Web application penetration testing
• Mobile application penetration testing
• Static application security testing (SAST)
• Dynamic application security testing (DAST)
Keeping a security program operational and integrated with your clients’ business is a difficult task. Our SecOps team acts as part of your clients’ organization, filling in whichever gaps are needed. We monitor and manage security systems and processes, freeing up resources for other critical responsibilities.
• Vulnerability management
• Security monitoring
• Log management
• Performance monitoring
• Patch management
• Configuration management
• Incident response
• Digital forensics
• Threat intelligence
• Threat hunting
Our Security Engineering Services help organizations incorporate security controls into their information system so that the controls become an integral part of the system’s operational capabilities to help prevent misuse and malicious behavior. We build and implement technologies that secure your organization through design, implementation, configuration, and management.
• Secure cloud development
• Security Automation development
• Vulnerability/Compliance scanning
• Web Application Security
• Security monitoring
• Log management
• Privileged access management
• Mobile device management
• Firewall, IDS, IPS
• Endpoint security
• Data loss prevention
• Identity credential and access management (IAM)