• Twitter
  • LinkedIn
  • 306-205-1121
  • info@rsolutions.com
rSolutions
  • Home
  • About Us
  • Cybersecurity
    • Managed Cybersecurity Services
    • Professional Cybersecurity Services
    • Sales & Licensing
  • Partners
  • Blog
  • Careers
  • Get in Touch
  • Search
  • Menu Menu

Optional Services

  • Network Threat Hunting
  • Network and Firewall Configuration Review
  • Internal Active Directory Health Check
  • Network Vulnerability Assessment and Penetration Testing
  • Mobile/Web Application Security Assessments
  • Wireless Vulnerability Assessment
  • Social Engineering
  • Security based Health Check
  • Security Whiteboard Services/ Architecture Review
  • Virtual Chief Information Security Officer
  • Adversary Simulation/Red Team Assessment
  • IT Security Program Assessment
  • Cloud or SaaS Assessments
  • IT Security Management
  • Incident Preparedness Service / tabletop exercises

Latest News

  • Here’s two things you need to know about this week…February 8, 2023 - 9:12 am
  • The 12 Threats of ChristmasThe 12 Threats of ChristmasDecember 22, 2022 - 10:05 am
  • Trust but verifyTrust, but Verify: Article 6 of 7November 29, 2022 - 2:26 pm
  • Attack Surface ManagementAttack Surface ManagementNovember 10, 2022 - 9:37 am

Skip to Section

rSolutions CorporationVisibility Drives Action
Logo image
Follow Us
Computer & Network Security • Regina, Saskatchewan • 300+ followers

Who We Are

  • About rSolutions
  • Our Partners
  • Our Blog
  • Contact Us
  • Privacy Policy

What We Do

  • Professional Services
  • Managed Security
  • Sales & Licensing
  • Trellix XDR
  • Fortinet Security
  • Splunk Data Intel

What’s New?

February 8, 2023

Here’s two things you need to know about this week…

December 22, 2022

The 12 Threats of Christmas

November 29, 2022

Trust, but Verify: Article 6 of 7

Link to: Get in Touch
  • Vancouver
  • Edmonton
  • Calgary
  • Regina
  • Winnipeg
  • Toronto
  • Ottawa
  • Halifax
  • Dallas
© rSolutions | Made with ♥ by Strategy Lab
  • Twitter
  • LinkedIn
  • Home
  • About
  • Services
  • Partners
  • Blog
  • Contact
  • Staff Login
Network Behavior Anomaly detectionFireEye Email Security Scroll to top