Cyber Security Gap Assessment Services

We believe that true risk assessment lies with the organization as a whole, rather than individual technologies. With us, you will understand all of your risks.

GET A FREE CONSULTATION
CMMC VS NIST 800-171

CMMC

 

We will help you demonstrate the appropriate maturity in capabilities and organizational maturity to the satisfaction of the assessor and certifier. You can reach 100% compliance months before the audit comes. Don’t wait until the last minute to get started.

 

Beginning in 2020, all contractors working for the DoD, even subcontractors must pass a CMMC Audit to ensure appropriate levels of cyber security controls and processes are adequate and in place to protect controlled unclassified information (CUI) on DoD contractor systems. We help DoD contractors prepare for their CMMC audit.

ISO 27001

 

ISO/IEC 27001 specifies a management system that is intended to bring information security under management control and gives specific requirements.

 

Organizations that meet the requirements may be certified by an accredited certification body following the successful completion of an audit.

ISO 27001 - Penetration Testing Compliance
NIST Cyber Security Partner - Purplesec

NIST

 

As of January 1, 2018, government contractors are expected to have implemented the requirements of NIST 800-171.

 

If an audit determines a failure to meet the requirements of NIST 800-171, consequences may include criminal, civil, administrative, or contract penalties – including termination of contracts. The coming CMMC will incorporate these controls.

 

Read: NIST 800-171 Incident Reporting Requirements

CIS TOP 18

 

The Center for Internet Security Critical Security Controls for Effective Cyber Defense is a publication of best practice guidelines for computer security. The guidelines consist of 20 key actions, called critical security controls (CSC), that organizations should implement to block or mitigate known attacks.

 

The controls are designed so that primarily automated means can be used to implement, enforce and monitor them. The security controls give no-nonsense, actionable recommendations for cybersecurity, written in language that’s easily understood by IT personnel.

cis top 20
PCI DDS - Penetration Testing Compliance

PCI/DSS

 

Keep your systems secure, and customers can trust you with their sensitive payment card information.

 

When you stay compliant, you are part of the solution – a united, global response to fighting payment card data compromise.

How it works with PurpleSec

consultation call

We begin every engagement with a friendly chat to better understand your security goals.

project manager

A security engineer and project manager will create a custom plan of action and milestones for the project.

penetration testing report

Observations and recommendations collected and formatted into a weekly and monthly executive reports.

SPEAK WITH AN EXPERT

Customer success

Cyber Security Services Firm Review - PurpleSec

Challenges Addressed

 

  • Required a one-time network vulnerability scan and assessment
  • Required a one-time network penetration test.
  • Current reporting were not seen as useful or valuable in the remediation process

 

Technologies Leveraged

  • Nessus

How We Delivered

 

  • Provided a network vulnerability assessment and penetration test report in 30 days
  • Worked with client to determine information requirements for their remediation process
  • Delivered a custom report to meet client needs
  • Provided explanations as to what value the current set of reports have in a remediation process
  • Over 100 IP addresses scanned internally and externally
managed it security services - purplesec

Managed Security

Learn More >

penetration testing services - purplesec

Penetration Testing

Learn More >

vulnerability patch management services - purplesec

Vulnerability Mgmt

Learn More >

security gap assessment services - purplesec

Risk Assessment

Learn More >