Compliance and Analysis
Penetration Testing
Penetration testing at Emerald gives you a snapshot analysis of the security posture of various components of your company infrastructure. Often working in support of compliance efforts, Emerald tests web applications, API interfaces, internal/external infrastructure, and even more niche categories like Wi-Fi testing, mobile applications, and physical access assessments. After an initial round of testing, our experts make themselves available to answer questions about findings, provide recommendations around remediation, and even participate in multiple rounds of retesting to ensure applied fixes go through without a hitch.
Service Offering | Supported | Not Supported |
---|---|---|
Internal Networks | ✅ | |
External Attack Surface | ✅ | |
Web Applications | ✅ | |
Wi-Fi Endpoints | ✅ | |
Cloud Environments | ✅ | |
API’s & Endpoints | ✅ | |
Mobile Applications | ✅ | |
Onsite Physical Engagements | ✅ | |
ICS & SCADA | ❌ |
Network Security Check
Vulnerability Scanning
Every day new security vulnerabilities are discovered and added to the database of public knowledge. These findings exist in numbers too large and too sophisticated for any single team to efficiently track and monitor. Vulnerability scanning allows you constantly updated reports on the state of your company’s networks and helps your team stay one step ahead of modern threats. Emerald provides both one time and routine scans to clients in support of compliance as well as teams looking to be proactive in their security approach.
Compliance Standards | Supported | Not Supported |
---|---|---|
PCI DSS | ✅ | |
HIPPA | ✅ | |
FINRA | ✅ | |
ISO 27001 | ✅ | |
SOC2 | ✅ |
SOC COllaboration Testing
Red Team Operations
Threat actors at home and abroad continue to grow in size, resources, and sophistication. Fine tuning a security system for next generation threats can mean the difference between a firewall event and a company wide breach. Emerald’s red teams mimic real world threats with tailored attacks that represent cutting edge exploits and next generation techniques. Think your team is up to the challenge? Give us a call and ask about red team table top exercises.
Engagements | Supported | Not Supported |
---|---|---|
Adversary Emulation | ✅ | |
SOC Co-Opting | ✅ | |
True Red Team | ✅ |