Cyber Security Services

Security Breach: WHEN, not IF

Professional Services for Defending Against & Responding to Critical Security Incidents

Request More Information

Our Services

INCIDENT RESPONSE

High Tide investigates and resolves technology security events ranging from single system compromises to enterprise-wide intrusions by advanced attack groups that span hundreds of thousands of systems. High Tide focuses on helping clients recover from each incident while minimizing the impact of the event on the organization.

High Tide’s steps to incident response:

  1. What Happened?
    • Each response begins understanding the current situation. How was the issue detected? What data has been collected? What steps have been taken? What is the environmental status?
  2. What Are Your Objectives?
    • What are your goals and with is practical and achievable. Goals may include determining the nature of the data loss, the cause of the loss, how and where the loss happened, and more.
  3. Forensic work to gather evidence
  4. Analyze the gathered data
    • High Tide establishes a timeline of activity and identifies the extent of the breach.
  5. Develop Action Plan
    • High Tide prepares a remediation plan and assists with the implementation of the plan
  6. Detailed Reporting
    • High Tide prepares a report that addresses the needs of multiple audiences including management, staff, regulators, and others.

UNDETECTED ASSESSMENT

This unique offering applies High Tide's specialized knowledge of advanced attackers’ tactics to evaluate whether they are currently operating undetected in an environment or whether they have been there in the past.

VULNERABILITY ANALYSIS

High Tide evaluates systems, applications, and networks for security vulnerabilities that are most likely to be compromised by outside entities. The analysis includes a determining which vulnerabilities are most serious. HT’s vulnerability assessment services uncover deficiencies of security policies based on actual methods that may be used by data thieves. In addition to determining deficiencies, HT also provides recommendations to improve security. Deficiencies are prioritized based on risk, probability of occurrence, and the potential disruption.

LITIGATION SUPPORT

High Tide helps to preserve, collect, analyze, and process electronic evidence. High Tide consultants regularly provide expert witness testimony.

CONTINUED SERVICE AND SUPPORT

High Tide assists organizations in improving internal teams of incident response. High Tide reviews current procedures, internal capabilities, and technological advancement against leading security best practices. High Tide also assists in training and on-going consulting services.

Operational Processes development & Review
 

  • IT Disaster Recovery and Business Continuity
  • Business Impact Analysis
  • IT Risk Assessment
  • Technology Planning and Alignment with Overall Business Plan - Including Optimizing Expenditures and ROI for IT
  • System Development Life Cycle (SDLC) 
  • Data Privacy
  • Data Confidentiality 
  • Data Mining
  • Financial Systems
  • IT Governance

APPLICATION SECURITY

Testing applications at regular intervals, especially after changes have been made to an application, is critical in order to maintain an attacker-resilient environment.

INFRASTRUCTURE/ENVIRONMENTAL SECURITY

High Tide’s services include:
 

  • External network vulnerability assessments and penetration testing
  • Internal network vulnerability assessments
  • Network architecture reviews
  • Device configuration reviews (covering both host and network devices)
  • Wireless security assessments
  • VoIP security assessments
  • Social engineering and physical penetration test
  • Internal assessments
  • Custom services as needed