Service Offerings

Compliance and Analysis

Penetration Testing

Penetration testing at Emerald gives you a snapshot analysis of the security posture of various components of your company infrastructure. Often working in support of compliance efforts, Emerald tests web applications, API interfaces, internal/external infrastructure, and even more niche categories like Wi-Fi testing, mobile applications, and physical access assessments. After an initial round of testing, our experts make themselves available to answer questions about findings, provide recommendations around remediation, and even participate in multiple rounds of retesting to ensure applied fixes go through without a hitch.

Service OfferingSupportedNot Supported
Internal Networks
External Attack Surface
Web Applications
Wi-Fi Endpoints
Cloud Environments
API’s & Endpoints
Mobile Applications
Onsite Physical Engagements
ICS & SCADA
Network Security Check

Vulnerability Scanning

Every day new security vulnerabilities are discovered and added to the database of public knowledge. These findings exist in numbers too large and too sophisticated for any single team to efficiently track and monitor. Vulnerability scanning allows you constantly updated reports on the state of your company’s networks and helps your team stay one step ahead of modern threats. Emerald provides both one time and routine scans to clients in support of compliance as well as teams looking to be proactive in their security approach.

Compliance StandardsSupportedNot Supported
PCI DSS
HIPPA
FINRA
ISO 27001
SOC2
SOC COllaboration Testing

Red Team Operations

Threat actors at home and abroad continue to grow in size, resources, and sophistication. Fine tuning a security system for next generation threats can mean the difference between a firewall event and a company wide breach. Emerald’s red teams mimic real world threats with tailored attacks that represent cutting edge exploits and next generation techniques. Think your team is up to the challenge? Give us a call and ask about red team table top exercises.

EngagementsSupportedNot Supported
Adversary Emulation
SOC Co-Opting
True Red Team