Post on 21-Dec-2014
description
Conquest Security, Inc.
Founded in April, 2005• Gaithersburg, MD
Government and Commercial Clients in MD, DC, & VA
An SBA 8(a) Certified Business (03/05/2016)
GSA Schedule 70 (GS-35F-0842R)
NITAAC CIO-SP3 (CTA)• BCT Partners• Small Business set-aside: 7/15/2012 – 7/14/2022• 8(a) set-aside: 6/30/2012 – 6/29/2022
NASA SEWP IV Sales Agent• Sword & Shield Enterprise Security
©2013 Conquest Security, Inc. All Rights Reserved
2
Our Team
Government and Commercial Information Security Experience
Information Security Engineers• Certified Information Systems Security
Professional – (CISSP)® • Certified Ethical Hacker – C|EHTM • Licensed Penetration Tester – L|PTTM • Computer Hacking Forensic Investigator – C|
HFITM
©2013 Conquest Security, Inc. All Rights Reserved
3
What We Do
Information Security Consulting Services
Continuous Monitoring & Managed Services
Training & Educational Services
Reseller of Industry Leading Solutions
©2013 Conquest Security, Inc. All Rights Reserved
4
Our Services
Vulnerability Assessment Services
Penetration Testing
Cyber Intelligence Services
Policy and Procedure Development
Remediation & Hardening Services
Cloud Based Vulnerability Assessment Service©2013 Conquest Security, Inc. All
Rights Reserved5
Continuous Cyber Security Monitoring
©2013 Conquest Security, Inc. All Rights Reserved
6
Cyber Intelligence Reports
Dark Web Monitoring• Hackers disclose information about
organization’s code, vulnerabilities, and confidential information
Know what’s being shared about your organization and defend against attack.
Assess external information and vulnerabilities.
Remediate and reduce your exposure.
©2013 Conquest Security, Inc. All Rights Reserved
7
Training
Instructor-lead Onsite or Online Training
Customized Scheduling
• Certified Information Systems Security Professional – (CISSP)®
• Information Security for Systems Administrators
• Information Security for Software Developers
©2013 Conquest Security, Inc. All Rights Reserved
8
Cyber 360 Vulnerability Scanning
Cloud Based Vulnerability Scanning • Self Service
No Software to Download
Fast Cloud Based Scanning• External and Internal Scanning
Reports• Executive and Technical • HTML, CSV, PDF
©2013 Conquest Security, Inc. All Rights Reserved
9
Cyber Security Solutions
Next Generation Firewall
Firewall Policy/Configuration Management
Monitoring & Automation
Compliance Automation
Password Auditing and Recovery
©2013 Conquest Security, Inc. All Rights Reserved
10
Cyber Security Solutions
©2013 Conquest Security, Inc. All Rights Reserved
11