SecureStrux, LLC is a women-owned small business (WOSB) cybersecurity firm that provides specialized services in the areas of compliance, vulnerability management, computer network defense, and cybersecurity strategies. With employees operating from 11 different states across the US supporting both CONUS and OCONUS clients, our diverse and seasoned team members are committed to empowering clients with the knowledge and tools they need to build and successfully run their cybersecurity programs.
Cloud Security
Whether you utilize a cloud service or provide cloud services, testing cloud infrastructure is becoming more and more essential to maintaining a secure cloud system. SecureStrux offers a portfolio of cloud service provider tests and cloud penetration testing to protect your operations.
Endpoint Security
Endpoint Security support is a core requirement for any DoD agency and its partners. This powerful tool and its components can be complex and costly to manage, but its ability to significantly reduce risk and protect core assets is instrumental in safeguarding network assets. SecureStrux works side-by-side with a variety of agencies and vendors who utilize Endpoint Security and its many components. We design our efforts to identify risks that Endpoint Security can mitigate or detect, and help you determine the best implementation policies and plans to maintain the delicate balance of maintaining a secure network while maximizing daily business operations.
Penetration Testing
SecureStrux provides a complete and thorough set of assessment services available in the industry. With multiple, unique penetration testing services available, our team of cleared and credentialed security professionals can address nearly any assessment need you may have. We have the experience and expertise to identify your organization’s vulnerabilities, engineer secure solutions and, most importantly, put your business on the path to remaining sustainably secure. With each and every engagement, we will provide a detailed plan to correct the vulnerabilities and, if desired, assist in the correction of the vulnerability. Please contact us today to learn more about how we can help you.
Risk Management
The Department of Defense continues to improve and evolve the Risk Management Framework (NIST 800-53) process to increase the protection and security of the assets within the DoD and the Defense Industrial Base. When acquiring an Authority to Operate (ATO), three main types of ATO’s can be applied for and received. An Enclave (SIPRNet, NIPRNet, eWAN), System (MUSA/SUSA/P2P), or Application (Software/Hardware) ATO.
Threat Intelligence
SecureStrux offers components required by any successful insider threat defense. We offer a complete Insider Threat Assessment based on a variety of DISA Security Technical Implementation Guides (STIGs), Operational Orders (OPORDS), and industry best practices. We examine your existing organization and network for weaknesses and exploitable points in personnel, account management, physical security, and technical controls such as Data Loss Protection (DLP), two-factor authentication, and logging controls of your staff. SecureStrux is even on the cutting edge of mitigating insider threats through security automation.