Cloud Testing

Posted in:

The future is in the cloud and adversaries know it.Cloud misconfigurations have accounted for Trillions of dollars stolen. Whether it be MS Azure, Amazon AWS, or Google GCP, PLEX has the expertise to audit and test your Cloud environment

Purple Team

Posted in:

Purple team engagements allow the red (attacker) and blue (defense) team to blend together to ensure that defensive capabilities robust enough to handle attacks. The red team can run attacks and coordinate with the blue team to build the right…

Adversarial Simulation and Penetration Testing Services

Posted in:

PLEX security testers used a National Security Agency (NSA) NSCAP-accredited cybersecurity assessment methodology to review client networks for security flaws from every possible angle. The NSA NSCAP VAS accreditation is the new gold standard for vulnerability assessment service providers. To…

Application Security

Posted in:

It is critical to test applications at regular intervals, especially after important changes or before launching new applications. Regular application security assessments will help identify and remediate vulnerabilities and maintain an attacker-resilient web presence. Our extensive portfolio of application security…

Virtual CISO

Posted in:

PLEX Cyber’s Virtual CISO Service provides your business with a trusted advisor who will help your organization evaluate and identify your risks and build a cybersecurity program to evaluate and improve your overall cybersecurity posture. Ask about the Fractional CISO…

Digital Forensics

Posted in:

Active Adversary HuntStatistics show that most data breaches and network intrusions go undetected for six months or more. During that time, hackers and cyber criminals multiply the damage to your network and, once the event goes public, your reputation is…

Incident Response (IR) Plan Development

Posted in:

The middle of a security incident is not the time to develop an incident response plan. A recent study reported that 90% of large organizations suffered a data breach in the past year and 74% of small/medium enterprises suffered major…

Phishing Simulations

Posted in:

The most effective way to protect your network from successful email phishing attacks is to give your staff regular practice and follow-up training with simulated phishing emails, tailored specifically to your company. PLEX CYBER PHISHING SIMULATIONS INCLUDE

Security Risk Assessment Framework (SRAF)

Posted in:

Based on the National Institutes of Science & Technology (NIST) Cybersecurity Framework, the PLEX SRAF enables organizations to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. The SRAF provides order…

Tabletop Exercises

Posted in:

PLEX Solutions conducts a wide variety of training events that allow companies to walk though or practice their security plans and procedures. Particularly useful are Incident Response (IR) tabletop exercises that assemble the IR Team to practice and discuss handling…