Security Consulting & Implementation

Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
Security Consulting & Implementation создатель Mind Map: Security Consulting & Implementation

1. Forensics

1.1. Forensics

1.1.1. Incident Response

1.1.1.1. Crowdstrike

1.1.1.2. Cylance

1.1.1.3. Deloitte

1.1.1.4. Fidelis Cybersecurity

1.1.1.5. FireEye

1.1.1.5.1. Mandiant

1.1.1.6. Fox-IT

1.1.1.7. Guidance Software

1.1.1.8. Maryman & Associates

1.1.1.9. NTT Coms Security

1.1.1.10. Nettitude

1.1.1.11. Optiv

1.1.1.12. Presecure

1.1.1.13. Secureworks

1.1.1.14. Verizon

1.1.2. E-Discovery & Computer Forensics

1.1.3. Endpoint Forensics

1.1.4. Network Forensics

2. Governance, Advisory, Assessment

2.1. Architecture and Design

2.2. Business Continuity

2.3. Compliance Review

2.4. Compromise Assessment

2.4.1. Corvid

2.4.2. Crowdstrike

2.4.3. Cylance

2.4.4. Endgame

2.4.5. Fidelis Cybersecurity

2.4.6. FireEye

2.4.7. HPE

2.4.8. InfoCyte

2.4.9. KPMG

2.4.10. NTT Security

2.4.11. Optiv

2.4.12. Secureworks

2.5. Data Security Program

2.5.1. SecuriThink

2.6. Governance

2.6.1. Optiv

2.6.2. FOX-IT

2.6.3. Sec Consult

2.7. Governance, Compliance and Policy Design

2.7.1. Compliance Mandates

2.7.1.1. PCI

2.7.1.1.1. WorldWide

2.7.1.1.2. Regional

2.7.1.2. ISO

2.7.1.3. HITECH

2.7.1.4. HIPAA

2.8. Penetration/Red Teaming

2.8.1. Alagen

2.8.2. Black Hills Information Security

2.8.3. CA VeraCode

2.8.4. Cipher Security LLC

2.8.5. CoalFire

2.8.6. eSec Forte

2.8.7. eSecuritySolutions

2.8.8. FireEye

2.8.9. Kratical

2.8.10. Mile2

2.8.11. NetraGuard

2.8.12. NetSpi

2.8.13. nettitude

2.8.14. Offensive-Security

2.8.15. PentestPartners

2.8.16. Protivity

2.8.17. Rapid7

2.8.18. Redbot Technologies

2.8.19. RhinoSecurityLabs

2.8.20. ScienceSoft

2.8.21. ScienceSoft

2.8.22. SecureAuth

2.8.23. SecureusGlobal

2.8.24. SecureWorks

2.8.25. SecurityMetrics

2.8.26. spohnsolutions

2.8.27. SumaSoft

2.8.28. TBGSecurity

2.9. People Centric Strategy

2.9.1. SecuriThink

2.10. Policy Design

2.11. Program Assessment

2.12. Risk Assessment

2.12.1. Secured Packet Inc

2.13. Risk Management

2.13.1. Booz Allen Hamilton

2.13.2. Optiv

2.13.3. Cloud Risks

2.13.4. On Premise Infrastructure

2.13.5. Business Risk

2.14. Security Program Development

2.14.1. Optiv

2.14.2. FOX-IT

2.15. Strategy

2.15.1. SecuriThink

3. Operations

3.1. Application Security

3.1.1. Web

3.1.1.1. AppSec Consulting

3.1.1.2. Denim Group

3.1.1.3. Security Innovation

3.1.1.3.1. https://www.securityinnovation.com/services/software-assessment/security-code-review.html

3.1.1.4. WhiteHat Security

3.1.1.5. Citigal

3.1.1.6. IOActive

3.1.2. Mobile

3.1.2.1. AppSec Consulting

3.1.2.2. Denim Group

3.1.3. Software Security Lifecycle (SDLC)

3.1.3.1. AppSecConsulting

3.1.3.2. Security Innovation

3.1.4. Custom Code

3.1.4.1. AppSec Consulting

3.1.4.2. Security Innovation

3.2. Application Security Vulnerability Assessement

3.3. Configuration Assessment

3.4. Device Security

3.5. Fraud, Identification and Privacy

3.6. Incident Response

3.6.1. Blackthorn Technologies

3.6.2. Crowdstrike

3.6.3. Dell SecureWorks

3.6.4. Deloitte

3.6.5. EY

3.6.6. FOX-IT

3.6.7. FireEye

3.6.8. High Tech Bridge

3.6.9. Ingalls Information Security

3.6.10. McAfee

3.6.10.1. Foundstone

3.6.11. K2 Intelligence

3.6.12. Lares Consulting

3.6.13. Maryman

3.6.14. NTT Coms Security

3.6.15. Nettitude

3.6.16. Optiv

3.6.17. PWC

3.6.18. Presecure

3.6.19. Sec Consult

3.6.20. Stroz Friedberg

3.6.21. TrustMatta

3.7. Penetration Testing

3.7.1. AppSec Consulting

3.7.2. Core Security

3.7.3. Element Digital Security

3.7.3.1. http://www.edigitalsecurity.com/

3.7.4. FOX-IT

3.7.5. High Tech Bridge

3.7.6. Ingalls Information Security

3.7.7. K2 Intelligence

3.7.8. Matasano Security

3.7.9. NCC Group

3.7.10. Penetration Lab

3.7.11. Rapid7

3.7.12. Secureworks

3.7.13. TrustMatta

3.7.14. TrustedSec

3.7.15. WhiteHat Security

3.8. Remote Access

3.9. Secure Code Review

3.9.1. AppSec Consulting

3.9.2. Aspect Security

3.9.3. Veracode

3.9.4. Security Innovation

3.9.5. CheckMarx

3.9.6. Denim Group

3.9.7. Astech Consulting

3.9.8. PivotPoint Security

3.9.9. Pure Hacking

3.10. Threat Intelligence

3.11. Vulnerability Scan

4. Providers by Region

4.1. Canada

4.1.1. Conexsys

4.2. Emerging Asia/Pacific

4.2.1. India

4.2.2. Indonesia

4.3. Eurasia

4.3.1. Russia

4.4. Europe

4.4.1. Eastern Europe

4.4.1.1. Poland

4.4.1.1.1. Aecom

4.4.1.1.2. BCC

4.4.1.1.3. Deloitte

4.4.1.1.4. EY

4.4.1.1.5. Expressworks International

4.4.1.1.6. Syntegrity Networks

4.4.1.1.7. Telos

4.4.2. Western Europe

4.4.2.1. Italy

4.4.2.1.1. KBE.it

4.4.2.1.2. Consulthink SPA

4.4.2.2. United Kingdom

4.4.2.2.1. nccgroup

4.4.2.2.2. Corvid

4.4.2.3. Germany

4.4.2.3.1. nccgroup

4.5. Greater China

4.5.1. China

4.5.2. Hong Kong

4.5.3. Taiwan

4.6. Latin America

4.6.1. Argentina

4.6.2. Brazil

4.6.3. Chile

4.6.4. Columbia

4.6.5. Mexico

4.6.6. Peru

4.6.7. Veneszuela

4.7. Mature Asia/Pacific

4.7.1. Australia

4.7.1.1. nccgroup

4.7.1.1.1. FOX-IT

4.7.2. Singapore

4.7.2.1. nccgroup

4.7.2.1.1. FOX-IT

4.7.3. South Korea

4.7.4. Japan

4.8. Middle East and North Africa

4.8.1. Saudi Arabia

4.8.1.1. GBM

4.8.1.1.1. http://www.gbm4ibm.com/inside-ins-solutions.php?m=third

4.8.1.2. PGI

4.8.1.2.1. http://www.pgitl.com/

4.8.2. Israel

4.8.3. Turkey

4.8.4. Egypt

4.8.5. Qatar

4.8.6. Iran

4.8.7. Algeria

4.8.8. Iraq

4.8.9. United Arab Emirates

4.8.9.1. nccgroup

4.8.9.1.1. FOX-IT

4.9. North America

4.9.1. A-G

4.9.1.1. AppsecConsulting

4.9.1.2. CSC

4.9.1.3. Control Case

4.9.1.4. CrowdStrike

4.9.1.5. Dell Secureworks

4.9.1.6. Deloitte

4.9.1.7. Denim Group

4.9.1.8. Ernst & Young

4.9.1.9. FireEye

4.9.1.10. ForSythe Solutions

4.9.1.11. Grant Thornton

4.9.2. H-L

4.9.2.1. HP

4.9.2.2. IBM

4.9.2.3. IOActive

4.9.2.4. Ingalls Information Security

4.9.2.5. McAfee (Foundstone)

4.9.2.6. K2 Intelligence

4.9.2.7. Leidos

4.9.3. M-S

4.9.3.1. nccgroup

4.9.3.2. NTT Com Security

4.9.3.3. Neohapsis

4.9.3.4. Optiv

4.9.3.5. PWC

4.9.3.6. Paladion Networks

4.9.3.7. Perimeter eSecurity

4.9.3.8. Protivity

4.9.3.9. SISA

4.9.3.10. SecuriThink

4.9.3.11. Solutionary

4.9.3.12. Stroz Friedberg

4.9.3.13. Sungard

4.9.3.14. Sword and Shield

4.9.3.15. Symantec

4.9.3.16. Syntegrity Networks

4.9.3.17. Sysnet Global Solutions

4.9.4. T-Z

4.9.4.1. Tevora Business Solutions

4.9.4.2. Trustwave

4.9.4.3. Verizon

4.9.4.4. WhiteHat Security

4.9.4.5. Zensar Technologies

4.10. South Africa

4.10.1. Cyanre

4.10.1.1. http://www.cyanre.co.za/