Adversarial Simulation and Penetration Testing Services

Posted in:

PLEX security testers used a National Security Agency (NSA) NSCAP-accredited cybersecurity assessment methodology to review client networks for security flaws from every possible angle. The NSA NSCAP VAS accreditation is the new gold standard for vulnerability assessment service providers. To…

vCISO

Posted in:

The CISO or Chief Information Security Officer is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats. PLEX…

Password Audits

Posted in:

PLEX can audit your organization’s passwords for a fraction of the cost of an expensive penetration test. While testing the strength of your passwords, PLEX can also check for protocols and security flaws that could allow attackers to steal your…

Phishing Simulations

Posted in:

The most effective way to protect your network from successful email phishing attacks is to give your staff regular practice and follow-up training with simulated phishing emails, tailored specifically to your company. PLEX CYBER PHISHING SIMULATIONS INCLUDE Large catalogue of…

CISO On Demand

Posted in:

PLEX Cyber’s CISO On Demand Service provides your business with a trusted advisor who will help your organization evaluate and identify your risks and build a cybersecurity program to evaluate and improve your overall cybersecurity posture. Ask about the Fractional…

Digital Forensics

Posted in:

Active Adversary HuntStatistics show that most data breaches and network intrusions go undetected for six months or more. During that time, hackers and cyber criminals multiply the damage to your network and, once the event goes public, your reputation is…

Application Security

Posted in:

It is critical to test applications at regular intervals, especially after important changes or before launching new applications. Regular application security assessments will help identify and remediate vulnerabilities and maintain an attacker-resilient web presence. Our extensive portfolio of application security…

PLEX 360 Security Testing

Posted in:

As the name states, the 360 Security Test provides a complete vulnerability assessment. Understanding your current security posture is an important first step to improving it. PLEX has deep technical expertise in vulnerability assessment and identifying cybersecurity risks to your…

Tabletop Exercises

Posted in:

PLEX Solutions conducts a wide variety of training events that allow companies to walk though or practice their security plans and procedures. Particularly useful are Incident Response (IR) tabletop exercises that assemble the IR Team to practice and discuss handling…

Incident Response (IR) Plan Development

Posted in:

The middle of a security incident is not the time to develop an incident response plan. A recent study reported that 90% of large organizations suffered a data breach in the past year and 74% of small/medium enterprises suffered major…