Incident Response

Posted in:

Adversarial Simulation and Penetration Testing Services

Posted in:

PLEX security testers used a National Security Agency (NSA) NSCAP-accredited cybersecurity assessment methodology to review client networks for security flaws from every possible angle. The NSA NSCAP VAS accreditation is the new gold standard for vulnerability assessment service providers. To…

PLEX Guard

Posted in:

Need ongoing cybersecurity support? PLEX Guard is the solution. Cybersecurity Protection When and Where You Need It Security Event and Incident Monitoring Analyze network traffic and host logs in real-time Tuned for your environment and operations Alerts and trends available…

vCiso

Posted in:

Password Audits

Posted in:

PLEX can audit your organization’s passwords for a fraction of the cost of an expensive penetration test. While testing the strength of your passwords, PLEX can also check for protocols and security flaws that could allow attackers to steal your…

Phishing Simulations

Posted in:

The most effective way to protect your network from successful email phishing attacks is to give your staff regular practice and follow-up training with simulated phishing emails, tailored specifically to your company. PLEX CYBER PHISHING SIMULATIONS INCLUDE Large catalogue of…

CISO ON DEMAND

Posted in:

PLEX CISO ON DEMAND provides your business with a trusted advisor who will help your organization evaluate and identify your risks and build a cybersecurity program to evaluate and improve your overall cybersecurity posture. Ask about the Fractional CISO along…

Digital Forensics

Posted in:

Active Adversary HuntStatistics show that most data breaches and network intrusions go undetected for six months or more. During that time, hackers and cyber criminals multiply the damage to your network and, once the event goes public, your reputation is…

Application Security

Posted in:

It is critical to test applications at regular intervals, especially after important changes or before launching new applications. Regular application security assessments will help identify and remediate vulnerabilities and maintain an attacker-resilient web presence. Our extensive portfolio of application security…

PLEX 360 Security Testing

Posted in:

As the name states, the 360 Security Test provides a complete vulnerability assessment. Understanding your current security posture is an important first step to improving it. PLEX has deep technical expertise in vulnerability assessment and identifying cybersecurity risks to your…