What We Offer

You’ll find complete cybersecurity services geared toward creating an effective security program that’s robust enough for the largest enterprises, but easy enough for even the smallest companies to manage.

Network Penetration Testing

Plumbers use a process they call “pressure testing” to find small leaks before they fill the pipes with water. Network penetration testing is a similar process for computer networks. We simulate the sorts of attacks that your network might encounter in the real world, in order to expose cracks and leaks before we open your network to the world.

Penetration testing works hand-in-hand with a network vulnerability assessment. The assessment is used to find hypothetical vulnerabilities. We then put these vulnerabilities to the test by trying to exploit them and penetrate your network.

Network Vulnerability Assessment

A network penetration test is akin to pounding on a wall with jackhammers and other heavy machinery, trying to find an opening. A network vulnerability assessment is more like sitting down with an architect, poring over blueprints, discussing the intrusion weaknesses of concrete, and then prioritizing potentially effective methods for bringing down the wall.

It’s brute force vs. educated inquiry, and both have their place.

In a vulnerability assessment, we use automated analysis tools to dissect your network, looking for known vulnerabilities, as well as negative confluences that could result in poor security performance. We create a thorough report which rates the relative dangers your network faces. These risks are hypothetical, only in the sense that they haven’t been tested with a real-world attack. That’s where a network penetration test comes into play.

Web Application Penetration

This is similar to a network penetration test, but with a more limited scope. With this test, our white hat hacker analysts will attempt to exploit flaws and weaknesses in your web application. They’ll try the same sorts of unauthorized attacks criminals use to breach personal data and seize control of your application. If they’re successful, we’ll be able to repair these vulnerabilities before your application gets hacked for real.

Source Code Auditing

Errors, outdated methods, and other types of poor construction in the source code for a particular piece of software or firmware can lead to weaknesses and backdoors that hackers and other bad actors can exploit. We can audit your software’s source code, as well as any open source components or standard libraries that are included, and make recommendations for fixing any security holes we discover. OnyxCSG can review source code written in any common programming language.

Advanced DDoS Protection

Imagine the worst traffic jam you’ve ever had the misfortune of sitting through. This is the situation hackers attempt to create when they utilize a distributed denial-of-service attack. The attack floods a website’s servers with a massive amount of bad traffic, overwhelming them and crippling the site.

These attacks have grown very sophisticated in recent years. Our dynamic DDoS countermeasures are able to protect against known attacks, as well as novel, “zero-day” attacks with very low latency. Our systems react and cut off back traffic before it can take down your site.

Virtual Private Network

A virtual private network encrypts any data you send or receive, securing it from outsiders attempting to steal a peek. Our VPN service uses the strongest encryption available, military-grade AES256. Pair this with simple operation and you’ll never expose sensitive information to data thieves again.

Computer Forensics

If you’re a party to a lawsuit or otherwise need properly-gathered digital evidence to answer a legal question, you need a computer forensics expert. We provide everything you might need, including first response and full forensic analysis. We provide complete reports that can be used as evidence in court.

Our investigations meet ISO/IEC 27037:2012 standards requirements for the proper identification, acquisition, and preservation of digital evidence. You can, of course, expect full privacy and confidentiality regarding any recovered evidence.

General Security Consultancy

Our consultants can help your business prepare for any threat you might face, as well as overcome any current challenges you’re facing. We’ll work with your team to keep your sensitive data away from prying eyes and keep your mission-critical services running. From malware threats and DDoS attacks to the risk of a data breach, we can help you help yourself.

Training

It may surprise you to learn that when it comes to cybersecurity, the weakest link often isn’t your servers, or your hardware or software configurations. It’s your employees.

Many of the most common cyberattacks target staff members. Phishing attacks, and emails that install trojans and other sorts of malware, including devastating ransomware attacks, are all welcomed onto company computers by uneducated employees.

We can help prevent these attacks by educating your workforce on the red flags they need to look for to avoid damaging emails. We also provide extensive information on how to handle these threats properly. The hackers don’t stand a chance against an educated, fully-prepared workforce.

Support

We pride ourselves on both our customer support and technical support. Our support teams operate at the same high level as our operations staff. We maintain all proper accreditations to assure that our support personnel possesses the necessary expertise to help with any critical issues your security systems might face.