ILLUMANT
www.illumant.comIllumant provides expert security assessment services from Penetration Testing, to Social Engineering, to Vulnerability Assessment, and Regulatory Compliance. Our client list spans all verticals and sizes, including Fortune 500 companies and small- to medium-sized business, research universities and colleges, as well as cities, counties, states and government agencies. We cover utilities, healthcare companies, financial institutions, online-merchants, manufacturing, and technology companies, as well as government agencies. Our assessment services offer clients the chance to view security weaknesses from a variety of angles. Beyond reporting technical vulnerabilities, we also identify root causes and provide remediation advice to fix problem and prevent recurrence. Assessment Offering Highlights • Perimeter Security Assessment (PSA) - Security and vulnerability analysis Internet facing systems and applications, or "hacker's perspective" • Web Application Security Assessment (WASA) - Credentialed and uncredentialed analysis of the security of application to test authentication bypass, privilege escalation, access to sensitive information, etc. • Critical Asset Security Assessment (CASA) - the assessment focuses of the client's critical network and computing assets from behind firewalls • Policies, Procedures & Practices Assessment (PPPA) - Review of an IT organization's management, documentation, and design of operations and conformance with regulatory requirements • Wireless Security Assessment (WSA) - Analysis of wireless LANs to identify weaknesses in configurations, and identification of rogue access points • Data Loss Prevention Assessment (DLPA) - Monitoring of network traffic and scanning of network storage to detect violations of data security • Social Engineering Assessment (SEA) - Simulated phishing, tailgating, and social media attacks to test employee security awareness And more ...
Read moreIllumant provides expert security assessment services from Penetration Testing, to Social Engineering, to Vulnerability Assessment, and Regulatory Compliance. Our client list spans all verticals and sizes, including Fortune 500 companies and small- to medium-sized business, research universities and colleges, as well as cities, counties, states and government agencies. We cover utilities, healthcare companies, financial institutions, online-merchants, manufacturing, and technology companies, as well as government agencies. Our assessment services offer clients the chance to view security weaknesses from a variety of angles. Beyond reporting technical vulnerabilities, we also identify root causes and provide remediation advice to fix problem and prevent recurrence. Assessment Offering Highlights • Perimeter Security Assessment (PSA) - Security and vulnerability analysis Internet facing systems and applications, or "hacker's perspective" • Web Application Security Assessment (WASA) - Credentialed and uncredentialed analysis of the security of application to test authentication bypass, privilege escalation, access to sensitive information, etc. • Critical Asset Security Assessment (CASA) - the assessment focuses of the client's critical network and computing assets from behind firewalls • Policies, Procedures & Practices Assessment (PPPA) - Review of an IT organization's management, documentation, and design of operations and conformance with regulatory requirements • Wireless Security Assessment (WSA) - Analysis of wireless LANs to identify weaknesses in configurations, and identification of rogue access points • Data Loss Prevention Assessment (DLPA) - Monitoring of network traffic and scanning of network storage to detect violations of data security • Social Engineering Assessment (SEA) - Simulated phishing, tailgating, and social media attacks to test employee security awareness And more ...
Read moreCountry
State
California
City (Headquarters)
Palo Alto
Industry
Employees
11-50
Founded
2007
Estimated Revenue
$1,000,000 to $5,000,000
Social
Employees statistics
View all employeesPotential Decision Makers
Chief Operations Officer / Founder
Email ****** @****.comPhone (***) ****-****Sales Development Specialist
Email ****** @****.comPhone (***) ****-****Senior Solutions Advisor
Email ****** @****.comPhone (***) ****-****Cyber Security Consultant
Email ****** @****.comPhone (***) ****-****
Technologies
(30)