Our internal cybersecurity assessment consists of reviewing and reporting on aspects within your digital domain such as access controls, malware detection, physical security, wireless configuration, mobile device management, change management control, patch/update management, remote access, backups and disaster recovery, and more.
The external cybersecurity assessment consists of open web reconnaissance, penetration testing, firewall configuration review, security device operation and configuration review, system change management appraisal, public facing access evaluation, exposure of sensitive system information through public web reconnaissance, and more.
We offer professional forensics services to search for and detect, recover, and preserve evidence found on digital systems, often for criminal or civil legal purposes. This process is tracked and managed with a complete “chain-of-custody” documentation process that will stand up in a court of law if needed.
Our service offers constant managed detection and response. It combines advanced machine learning and vigilant threat detectors located in a global security operations center to give your organization 360-degree visibility into your network. Plus, this service offers real time blocking of attacks through isolating capabilities to prevent lateral spread and business disruption.
Incident Management is a process that is focused on identifying and removing cybersecurity disruptions to your organization when they occur. Ideally, this should occur in a way that has little to no negative impact on your core business. We can offer these services from manual, hands-on approaches to the use of rapid response capabilities for threat containment.
Our employee cybersecurity training helps prepare team members to recognize and avoid the most common types of attack like phishing, spear phishing, vishing, and business email compromise. We also teach employees how to best keep themselves and the organization safe from cyber-attacks.
Our cybersecurity risk analysis consulting helps organizations easily understand and set the cybersecurity risk tolerances, based upon their industry. This service delves into the ten key risk areas: Data Criticality, Physical, Employees, Product/Service, Customer/Vendor/User, Competitor, Infrastructure, Regulatory, Cybersecurity Foundations and Insurance Coverage.
Hiring key security personnel or an information security officer can be critical to the safety of your organization. Our team works alongside your HR and IT department to vet potential hires; we can provide a list of questions, conduct initial interviews, act as advisors, or you can outsource the entire process to us.
TriCorps has been working with WW-AFCO Steel on various consulting projects for over two years from Strategy to Governance to Security. I greatly value the insights and pragmatic approaches and processes that TriCorps always brings to bear on any project. TriCorps has diverse and deep experience in a number of areas but always applies them in a rational and practical way that fits our size, culture and needs. With TriCorps assistance we have been able to substantially mature our Technology processes and overall governance.”
W&W AFCO Steel
“TriCorps provides security personnel, electronic security, and cybersecurity solutions at our corporate headquarters in Oklahoma City. Jasco has been extremely pleased with the level of service and client care TriCorps provides. TriCorps personnel not only give our employees a sense of security, and they have also integrated well into the culture of our organization.”