Image

The Market for Security Testing is Anything but Static

CATSCANv2CATScan℠ (Comprehensive Accurate Testing & Scanning) is based on the co-authored Open Web Application Security Project (OWASP) Web Application Testing Methodology, National Institute of Standards 800-Series and exceeds the PCI Standards Council 3.0 StandardsCATScan℠ is a professional services “hybrid” of people, process and the most effective open-source and commercial security technologies available to assist with the manual identification of software security bugs.

Clients Served:

  • Online Gaming
  • Entertainment
  • Financial Services Markets

attackerWith a CATScan℠ we can look inside out and outside in.

  • Traffic Analysis
  • Control Validation
  • Custom Web Application Security
  • Network Security

Obtain a proactive CATScan℠ in development or in production, if treated early security issues will not become front page news. Firm-fixed-price services ensure fast and effective service.

*Best practice issued by FFIEC is to rotate your assessment service providers regularly to ensure that you are getting a true independent evaluation of your security controls – learn more about  CATScan℠ today.

 

X

 


INTERNET INVESTIGATIONS (Domains/IP’s) 

cybertoolbelt-logoCyberTOOLBELT (CTB)  launched at BlackHat USA 2014 is a investigator platform with a comprehensive set of tools is designed for investigation of domains, IP addresses and other related information as cost effective, user-friendly and efficient as possible.

  • Watch the DIY (do-it-yourself) video with Tom Brennan to see how you might use the new investigative platform.
  • Take a test drive today using code: risk2015 to unlock all the features.
  • Don’t have time to learn another tool — contact our professional services team to help.

 

X


SOCIAL MEDIA RECONNAISSANCE REPORTS 

Social MediaAre you the last one to know….. DONT BE, obtain a Proactive awareness of Social Media exposure and risks to your business. With our Social Media Recon Reports we support your goals by conducting historical reconnaissance reports of open-source intelligence (OSINT) with both sentiment and centrality. Our Social Media Surveillance Report is a continuous 45 day search and collection from sources including blogs, Facebook, Google+, Instagram, LinkedIn, Pinterest, Twitter, and YouTube.

Our Defensible Social Media Reports include:

  • Outcall to discuss project with a dedicated cyber investigator
  • A defensible listing of the user’s online profiles and OSINT data extract
  • The last 15 posts and messages under each profile, and a link to each post
  • Requested keywords searched and flagged within each post
  • Social media images under each profile
  • The user’s known address(es)
  • Daily posts and messages triggers
  • Email alerts
  • Online image search

Social-MappingThe defensible Social Media Surveillance Report is delivered to you in a PDF file within 48 hours from the last day of the reporting period.  Expert witness testimony is available for an additional fee.

 

X

X

X

DOMAIN/DNS MANAGEMENT 

 


DEVELOPMENT, TESTING, PRODUCTION
Domain-names

ProactiveRISK makes it EASY for you to quickly register a new domain and manage your DNS records.  We offer easy to use services including domain and email forwarding and management of SSL certificates as a service. ProactiveRISK is a trusted name in the community with thousands of domains names under management.  We offer proactive privacy, complimentary forwarding and complimentary email routing to ANY domain perfect for brand management activities.

 

 

X

 

X

X

X