Keeping The Bad Guys Out

The rSolutions team provides innovative and agile information security consulting services that stay ahead of the curve on the ever changing landscape of security threats. Our services range from security architecture to security solutions integration.

Vulnerability Assessments

Vulnerability assessment, both internal and external are instrumental in verifying the status of your security controls. rSolutions transitions knowledge to your organization to assist in securing your valued data, while building capacity to remediate gaps.

 

Application Security Testing

Applications offer a popular gateway to hackers to embed malicious code to exploit your organizational data. Whether your organization is large or small, our experts can help improve your application security posture.

 

Wireless Security Assessments

Wireless networks provide great benefits to an organization including mobility, increase productivity and cost savings. However, wireless networking is prone to security issues. As a result, it is very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources. The first step is knowing where you currently stand.

 

Penetration Testing

As with most of rSolutions vulnerability service offerings we regularly perform penetration testing to help financial institutions, mining companies, oil and gas companies, the public sector and beyond. Our team has decades of combined experience in exploiting softness in security posture, so that it can be re-mediated before a breech occurs.

 

Network Architecture Reviews

When assessing your network’s security posture it is imperative that you look at all aspects of your environment. This assessment includes the physical components and their configuration as well as the operational procedures and data related to your organization. A network architecture assessment provides your organization with better understanding of system life cycle prioritization, vulnerability and risks. Knowing this can help you plan capital budgets, operate more securely and reduce your risk profile.

 

Social Engineering

Phishing, Tailgating, Pretexting, Baiting and Quid Pro Quo are becoming more prevalent on the IT Security landscape. Our team can conduct testing against your people to assess any vulnerabilities. By identifying the gaps that pose threats to your organization, we can help you increase your overall IT security posture.

 

Device Configuration Reviews

Understanding the nature of your devices, when applied to the life cycle of your entire IT system, provides visibility and ultimately control of its performance. Our experts understand a myriad of device configuration standards and issues that can help your organization better plan resources, budgets and risks to you IT security posture.

 

Cloud or SaaS Assessments

Centralized hosting of data storage and software as a service (SaaS) offerings are big business and as such we often get lulled into a false sense of security with their operation. Unfortunately, in provision of their services to your organization, many of these SaaS providers and cloud providers may have unintended gaps created as they interact with your established systems and custom applications.

 

IT Security Certifications & Frameworks

Our resources hold many professional security designations including CISSP, CISA, CISM, CRISC, ABCP and SCF certifications. As well, rSolutions resources have extensive experience with a variety of security and compliance standards, legislation, and security assessment frameworks including:

ISO 27001/27002

NERC

RCM HTRA

NIST

COBIT

OSCP

GCIH

GWAPT

PCI DSS

OWASP

OSSTMM

PA DSS

Center for Internet Security (CIS)

GPEN

GXPN