Cybersecurity Service Categories
Find specialists in every area of cybersecurity
Penetration Testing
Offensive security testing to identify vulnerabilities before attackers do. Includes network, web app, mobile, and social engineering assessments.
15 providers
Managed Security Services (MSSP)
24/7 security monitoring, threat detection, and incident response from a dedicated security operations center.
21 providers
Incident Response
Rapid breach investigation, containment, eradication, and recovery services when a security incident occurs.
12 providers
Compliance & Audit
SOC 2, HIPAA, PCI-DSS, ISO 27001, and other compliance framework assessments and audit preparation.
9 providers
Governance, Risk & Compliance
Enterprise risk management frameworks, policy development, and regulatory compliance programs.
10 providers
Virtual CISO
Fractional security leadership providing strategic guidance, program development, and board-level reporting.
2 providers
Security Awareness Training
Employee security training, phishing simulations, and security culture programs to reduce human risk.
5 providers
Vulnerability Management
Continuous vulnerability scanning, prioritization, and remediation tracking across your environment.
20 providers
Cloud Security
AWS, Azure, and GCP security architecture, configuration review, and cloud-native security solutions.
14 providers
Identity & Access Management
SSO, MFA, directory services, privileged access management, and zero trust architecture.
7 providers
Network Security
Firewall management, network segmentation, intrusion detection, and network monitoring solutions.
6 providers
Email Security
Anti-phishing, DMARC/DKIM/SPF configuration, email encryption, and business email compromise prevention.
4 providers
Endpoint Security
EDR, MDR, device management, and endpoint protection platforms for laptops, servers, and mobile devices.
13 providers
Application Security
Code review, SAST/DAST testing, DevSecOps integration, and secure development lifecycle consulting.
6 providers
Data Protection
Data loss prevention, encryption, backup solutions, and data classification programs.
3 providers
Threat Intelligence
Threat feeds, dark web monitoring, adversary tracking, and threat landscape analysis.
12 providers
Security Consulting
Strategic security advisory, program assessments, roadmap development, and security architecture review.
12 providers
OT/ICS Security
Industrial control system and SCADA security for manufacturing, energy, and critical infrastructure.
3 providers
Digital Forensics
Computer forensics, evidence collection, chain of custody, and expert witness services for legal proceedings.
4 providers
Red Teaming
Advanced adversary simulation combining multiple attack vectors to test organizational detection and response capabilities.
5 providers