About Us

Our Industries

  • Architecture and Engineering
  • Art
  • Chemicals and Energy
  • Construction
  • Fashion
  • Financial Services
  • Food and Beverage
  • Insurance
  • Life Science
  • Law Firms
  • Manufacturing and Distribution
  • Private Client
  • Private Equity
  • Public Relations/Advertising/Media
  • Real Estate
  • Technology

Our Methodology

Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework promulgated by the U.S. Department of Commerce.

  1. 1
    Identify
    • Segmentation & Access Controls
    • Employee Security Awareness & Training
    • Data Encryption & Data Loss Prevention 
    • Information Security Policies & Procedures
    • Security Baselining & Configuration / Change Management
  2. 2
    Protect
    • Access Control
    • Continuous Network & Endpoint Monitoring
    • Data Security
    • Information Protection & Procedures
    • Maintenance
    • Protective Technology
  3. 3
    Detect
    • Anomalies & Events
    • Security Continuous Monitoring
    • Detection Process
  4. 4
    Respond
    • Response Planning
    • Communications
    • Analysis
    • Mitigation
    • Improvements
  5. 5
    Recover
    • Recover Planning
    • Improvements
    • Communications

Looking for Cyber ConsultingMitigationRemediation?

Our Expertise

Redpoint personnel have extensive experience with enterprise risk management and information security. Each has at least 10 years of experience in their respective area of focus, and they carry advanced, differentiating information security credentials which include CISSP, CEH, GWAPT, GCIH, GPEN, OSCP.

In addition to understanding technical hacking techniques – which enables us to approach your company’s environment as an attacker would – we have in-depth experience with the major security frameworks and the developing cyber regulations (e.g. NIST, ISO, CIS-CSC, PCI-DSS, NY-DFS, SEC OCIE).

    error: