The Pinnacle Group Companies: CompuTek - Pinnacle Business Solutions - Cymbel Corporation

Implementing and managing a secure environment is very difficult and requires significant resource commitment. We can assist you to address your security and compliance needs by providing full scope penetration testing, outsourced security staff and services, compliance preparation, and security program creation and strategy.

Depending on customer need, we focus our engagements on social engineering, physical security and network security to address all aspects of implementing and maintaining a secure environment. We can also help with compliance needs, policies, procedures, controls, and virtual CSO functions.

Services Provided

Services Provided

  • Physical Security Testing / Consulting
  • Social Engineering (Targeted Phishing and Human Social Engineering)
  • External and/or Internal Network and Application Penetration Testing
  • Wireless and Bluetooth Profile and Testing
  • Security Interview-Based Assessment (non-adversarial)
  • Virtual CSO (Chief Security Officer)
  • Assistance in building a comprehensive sustainable security program

Benefits To You

  • External Security review
  • Audit preparation
  • Real world visibility into current security posture
  • Security program foundation knowledge
  • Provide information to close compliance gaps
  • Assistance in building a sustainable Information Security Program

Engagement Deliverables

  • Executive overview
  • Detailed notes
  • Full reports
  • Remediation recommendations

Compliance Frameworks

  • HIPAA/ARRA/HiTech
  • ISO27002 Framework
  • PCI/DSS
  • SOX
  • SAS70/SSAE16 preparation
  • NIST

Services Description

We perform comprehensive external penetration testing utilizing industry standard automated tools as well as manual testing using experience proven techniques which simulate what the bad guys will do.

We perform comprehensive internal penetration testing utilizing industry standard automated tools as well as manual testing using experience proven techniques which simulate what the bad guys will do.

We perform targeted phishing attacks with proven methods to test your staff’s resolve not to click unknown links and to avoid phishing email scams

We perform targeted social engineering attacks on staff and guards to gain physical access to restricted areas
We can perform wireless and Bluetooth radio architecture and vulnerability profiling and assessment.
This is our most popular service. Through a series of interviews with key personnel, we perform a ‘friendly’ assessment to determine the organizations overall security posture and make key recommendations toward a comprehensive and realistic remediation strategy. This service can be tailored to prepare your organization for an audit
We can provide resources to assist you in building a security program with internal personnel or as an ongoing outsourced service
Years of experience allow us to provide you with a comprehensive, realistic, and sustainable security program
We can provide you with a customized set of policies, procedures, and documented controls to address your specific compliance and security needs. This service can be tailored to prepare your organization for an audit