Cyber and Facility Security Risk Assessments by TigerSwan

Our modern era of technological advance has fundamentally altered the way we operate on a daily basis. The internet, mobile devices, social media, and much else has changed how businesses reach customers, how friends and families communicate, and how students learn. For all of the good brought on by technology, there are always bad actors willing to exploit new technologies. Each morning the international and local news stations hum with the latest cyber hacks and malware attacks, along with the list of global institutions that were affected.

But you don’t have to be one of those organizations on the news. TigerSwan is here to help you stay off that list though our proactive network and facility security solutions. We perform network and facility security assessments to identify potential points of exposure and asymmetric threats that are already attacking your network and financial systems. By equipping your organization with knowledge of your operational vulnerabilities, you are taking proactive steps to stay ahead of those willing to harm you, your customers, and your brand’s reputation.

Goodguy hackers for your organizational integrity

TigerSwan’s cyber security operations consists of penetrator teams that will emulate a variety of threats to your computer, networks, and infrastructure, just as a real-world attacker would. The only difference is that we want to fix the exposure, not exploit it.

We attempt to penetrate your data, networks, and systems in order to expose the security vulnerabilities present in your current system. Our cyber security investigation culminates with a confidential report that will highlight how penetrated your system. By knowing your organization’s risks and vulnerabilities, we recommend steps to mitigate a real security breach from malicious actors.

Our discreet and confidential services and methods include:

  • Information Security Risk Assessments
  • Information Security Penetration Testing
  • Penetration Testing (network, application, hardware, cloud, modem)
  • Vulnerability Scanning
  • Security Controls Testing
  • Access Control Penetration Testing
  • Social Engineering
  • Policy and Procedures

*We can also test for PCI, NERC or PISMA compliance or custom compliance requests.

Our Cyber Security penetration team is strong and robust, made up of penetrators with the following certifications:

  • CISSP – Certified Information Systems Security Professional
  • CEH – Certified Ethical Hacker
  • CRISC – Certified in Risk and Information Systems Control
  • CISM – Certified Information Security Manager
  • CIPP/G – Certified Information Privacy Professional/Gov
  • TCNA – Tenable Certified Network Auditor
  • GSNA – GIAC Systems and Network Auditor

Physical security assessments for a holistic understanding of your risk profile

TigerSwan’s critical infrastructure Security Consultants can work in tandem with our Cyber Security professionals to provide a comprehensive, on-site analysis of your facilities’ physical security.

Periodic physical penetration testing assessments are a critical part of your overall physical security program and play an essential role in a holistic business risk management approach.

TigerSwan provides a unique, multi-faceted facility penetration team to evaluate your facility. We use a combination of network penetrators to bypass your access control and SCADA technology, and physical security penetrators to uncover breach points and weaknesses within your physical security program.

Physical breach point testing includes an evaluation of your:

  • Security Staff
  • Badging and Guest Procedures
  • Entry Points
  • Communication Capabilities
  • Emergency Action Plans
  • Command Centers
  • Training Programs

At the end of testing out Security Operators deliver a final report outlining the strengths and weakness of your physical security program. We collaborate with your security personnel to clearly explain why the current security measures are obsolete and demonstrate best practices that should be implemented into the new physical security program.