|
|
|
1-10 employees
View all
|
|
Information Technology & Services
|
|
2230 Woodbury Pike, Loysburg, Pennsylvania 16659, US
|
|
Cyber Protection Group is your Information Security expert. With nearly 20 years of experience, we specialize in vulnerability assessments including network penetration tests, web application penetration tests, risk assessments, and PCI. We experienced enough to help small to enterprise level businesses, but small enough to have a great relationship with every client.
Experience working with enterprise, school district, non profit, and private sector technology systems.
Very in-tune with OWASP, SANS, PCI, NIST standards.
Mitigating Risk via SANS 20 Critical Controls
Employees trained in:
SANS - Network Penetration and Ethical Hacking
SANS - Application Testing and Ethical Hacking
OFFENSIVE-SECURITY - Penetration Testing with BackTrack and Kali
Specialties: PCI Auditing, PCI GAP Assessments, Information Security, Penetration Testing, Application Security Testing, Vulnerability Assessments, and Wireless Penetration Testing, Wireless Intrusion Detection, Search Engine Optimization, Risk Mitigation, SANS Critical Controls
Tools: ArcSight, MetaSploit Framework, MetaSploit Pro, Nexpose, Aruba Airwave, Mcafee Orchestrator Nmap, Nessus, Kali, Backtrack, OpenVas, Burp Suite, Snort, Wireshark
Other services include vulnerability scanning, wireless penetration testing, intrusion detection, application security, risk assessments, vulnerability management, risk assessments
|
Cyber Protection Group Email Formats | Example Email Formats | Percentage |
---|---|---|
{first} | [email protected] |
100%
|
The widely used Cyber Protection Group email format is {first} (e.g. [email protected]) with 100% adoption across the company.
To contact Cyber Protection Group customer service number in your country click here to find.
Find accurate personal emails, work emails and phone numbers for employees
Accelerate prospecting with instant access to 300M professionals from 30M companies with the right contact details.