M11 has an expertise in delivering the following IT Security solutions
CISO Office:
List the responsibilities of CISO as an offering
We work with clients to provide full service platform of CISO office role and responsibilities, with accountability and risk management package.
1. Cyber Intelligence
Find below the list of services that we provide under Cyber Intelligence security services.
Open Source Digital Network Intelligence (OS-DNI) (also known as OSINT++)
- 1. Social Media
- 2. Google information analytics
- 3. Image EXIF Data
Continuous Monitoring
- 1. Security Background
- 2. Asset Tracking and Monitoring
- 3. Target Tracking and Monitoring
Electronic Intelligence (ELINT)
- 1. Cell-phone monitoring
- 2. Radio/CB/walkie-talkie monitoring
- 3. Other RF communications
HUMINT
- 1. Spear-phishing
- 2. Social Engineering
Training
- 1. Creating Consistent Intel Reports
- 2. Creating Actionable Intel Reports
- 3. Reading Actionable Intel Reports
2. Active Defense:
Find below the list of services that we provide under defense security services.
Penetration Testing
- 1. Physical
- 2. Social
- 3. Computer – Internet
- 4. Computer – Close Access
- 5. PCI Security Audit
- 6. General web security
- 7. Database Security
- 8. Cross Site Scripting
Ethical Hacking
- 1. Fuzzing
- 2. Determining if a crash is exploitable
- 3. 0-day generation
- 4. Stage 1 installers
- 5. Stage 2 installers
- 6. Command and Control Networks
Specialized Testing/ Forensics
- 1. Cell Phone
- 2. Wireless (802.11, ZigBee, and others)
- 3. SCADA
D. Training
- 1. Customized training for any and all of the above.
Operations Centers (OC)
- 1. Security Operations Center (SOC)
- 2. Network Operations Center (NOC)
- 3. Threat Operations Center (TOC)
- 4. Mission Operations Center (MOC)
- 5. Single Point Operations Center (SPOC)
Table Top Exercises
- 1. Red Force / Blue Force Exercises
- 2. War Gaming Scenarios
Custom Operations Centers (OC) development
- 1. Facility
- 2. Toolsa. Commercial. Custom
- 3. Training
Managed Security Services
- 1. Outsourced SOC/NOC
- 2. Reduced/transferred customer Risk
Specialized
- 1. Custom Artificial Intelligence Solutions
- 2. SCADA solutions
- 3. Social Engineering
- 4. Operational Security
- 5. Situational Awareness
- 6. Behavior Analysis
3. High Assurance
Find below the list of services that we provide under High Assurance security services.
Terms
- 1. Multi-Level Security (MLS)
- 2. Mandatory Access Controls (MAC)
- 3. Trusted Computing (TCS)
- 4. High Assurance Guard (HAG)
- 5. Cross-Domain Solutions
- 6. Data Diode
Standards
- 1. Rainbow Series (A1 through D)a. Particularly the Orange Book 5200.28-STD “DoD Trusted Computer System Evaluation Criteria
- 2. Common Criteria (The EAL levels 7 through 1)
Solutions
- 1. Customized solutions for firewalls
- 2. Customized solutions for SCADA
- 3. Customized solutions for cellphones
4. Forensics
Find below the list of services that we provide under Forensics security services.
Training and simulation exercises
- 1. Police Investigation for Trafficking. Drug. Weapons and Gangs
- 2. General crime
- 3. Intel Gathering
- 4. Planning and on-support
Defense
- 1. Incident Response
- 2. Background Investigations
- 3. Verification of Installation/Configuration