Independent Security Evaluators

Independent Security Evaluators

United States
2005
Private
< $10m
11 - 50
 Open website
Contact Vendor
Feature New Record
SIMILAR SUPPLIERS
Supplier LogoIndependent Security Evaluators
Supplier SVG Logo
Supplier LogoIndependent Security Evaluators
Supplier SVG Logo

Overview
Supplier Slogan
HQ LocationUnited States
Year Founded2005
Company TypePrivate
Stock Ticker
Revenue< $10m
Employees11 - 50
Website Open website
Twitter Handle@isesecurity
Company Description

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research. Using an adversary-centric perspective driven by our elite team of analysts and developers, we improve our clients’ overall security posture, protect digital assets, harden existing technologies, secure infrastructures, and work with development teams to ensure product security prior to deployment.

IoT Solutions

Threat Modeling

System resiliency doesn’t happen by chance; instead, its’ roots can be traced directly back to Threat Modeling. A threat model is a critical aspect of any security program, and is the foundation upon which any resilient system must be built. In most engagements, ISE works with the customer to build out the threat model, identifying and describing the three primary components of this crucial security plan: assets, adversaries, and attack surfaces. Without a threat model, an organization does not have a security plan in place. With a threat model, an organization can effectively consider risk and make informed decisions about how to reduce it.

Manual Assessment

Adversaries are human. As such, we use human intelligence to perform manual assessments to discover all possible ways compromise could occur. Manual assessment entails thorough investigation of ways in which a dedicated adversary could manipulate a system’s functionality for unintended consequences. ISE investigates manually in order to emulate the level of care that a committed adversary would apply in the pursuit of an attack. Automated tools do serve a purpose in any investigation, as running such tools is the first step that any attacker would take. However, it is only with manual assessment that higher level, sophisticated, custom attacks can be defended against.

Custom Tests

We dig deeper because it matters. Customization is a critical component to any successful security assessment. As all systems are custom, so, too, are all ISE security hardening processes. ISE utilizes a white box methodology, wherein ISE reviews all publicly and privately available documentation and design documents, workflow diagrams, firewall rules, and any other supporting documentation. ISE interfaces with key engineers as well as business and technical leadership. From there, ISE designs and performs custom tests, both to gather more information about how a system operates and is implemented, as well as to test for custom-tailored, unique security vulnerabilities. These assessment tasks are predominantly manual, and involve strategic thinking from the perspective of the adversary.

Mitigation Roadmap

ISE does not perform security assessments for the sole purpose of finding problems. Instead, we do it to provide solutions. While it is important to identify security problems, it is equally important to identify effective solutions. ISE devises proven mitigation strategies that dovetail with business objectives, and then works with client engineers to ensure they are well understood, properly implemented, and do not introduce any new vulnerabilities. ISE assists the customer in developing and adapting the mitigation roadmap as business needs, industry conditions, and stakeholder demands evolve over time.

Key Customers

We serve numerous industries and have been honored to partner with some of the world’s leading pioneers like Disney, Google, Amazon, Microsoft, Netflix, Warner Brothers, Qualcomm and many more.

Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & Privacy
Industries
Use Cases
Functions
ServicesCybersecurity Services

Technology Stack
Infrastructure as a Service (IaaS)None
Platform as a Service (PaaS)None
Application Infrastructure & MiddlewareNone
Analytics & ModelingNone
Functional ApplicationsNone
Cybersecurity & PrivacyModerate
Networks & ConnectivityNone
Processors & Edge IntelligenceNone
SensorsNone
Automation & ControlNone
RobotsNone
DronesNone
WearablesNone
ActuatorsNone
OtherNone

Similar Suppliers
Similar Suppliers

Partners
Partners

Overview
Supplier Slogan
HQ LocationUnited States
Year Founded2005
Company TypePrivate
Stock Ticker
Revenue< $10m
Employees11 - 50
Website Open website
Twitter Handle@isesecurity
Company Description

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research. Using an adversary-centric perspective driven by our elite team of analysts and developers, we improve our clients’ overall security posture, protect digital assets, harden existing technologies, secure infrastructures, and work with development teams to ensure product security prior to deployment.

IoT Solutions

Threat Modeling

System resiliency doesn’t happen by chance; instead, its’ roots can be traced directly back to Threat Modeling. A threat model is a critical aspect of any security program, and is the foundation upon which any resilient system must be built. In most engagements, ISE works with the customer to build out the threat model, identifying and describing the three primary components of this crucial security plan: assets, adversaries, and attack surfaces. Without a threat model, an organization does not have a security plan in place. With a threat model, an organization can effectively consider risk and make informed decisions about how to reduce it.

Manual Assessment

Adversaries are human. As such, we use human intelligence to perform manual assessments to discover all possible ways compromise could occur. Manual assessment entails thorough investigation of ways in which a dedicated adversary could manipulate a system’s functionality for unintended consequences. ISE investigates manually in order to emulate the level of care that a committed adversary would apply in the pursuit of an attack. Automated tools do serve a purpose in any investigation, as running such tools is the first step that any attacker would take. However, it is only with manual assessment that higher level, sophisticated, custom attacks can be defended against.

Custom Tests

We dig deeper because it matters. Customization is a critical component to any successful security assessment. As all systems are custom, so, too, are all ISE security hardening processes. ISE utilizes a white box methodology, wherein ISE reviews all publicly and privately available documentation and design documents, workflow diagrams, firewall rules, and any other supporting documentation. ISE interfaces with key engineers as well as business and technical leadership. From there, ISE designs and performs custom tests, both to gather more information about how a system operates and is implemented, as well as to test for custom-tailored, unique security vulnerabilities. These assessment tasks are predominantly manual, and involve strategic thinking from the perspective of the adversary.

Mitigation Roadmap

ISE does not perform security assessments for the sole purpose of finding problems. Instead, we do it to provide solutions. While it is important to identify security problems, it is equally important to identify effective solutions. ISE devises proven mitigation strategies that dovetail with business objectives, and then works with client engineers to ensure they are well understood, properly implemented, and do not introduce any new vulnerabilities. ISE assists the customer in developing and adapting the mitigation roadmap as business needs, industry conditions, and stakeholder demands evolve over time.

Key Customers

We serve numerous industries and have been honored to partner with some of the world’s leading pioneers like Disney, Google, Amazon, Microsoft, Netflix, Warner Brothers, Qualcomm and many more.

Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & Privacy
Industries
Use Cases
Functions
ServicesCybersecurity Services

Technology Stack
Infrastructure as a Service (IaaS)None
Platform as a Service (PaaS)None
Application Infrastructure & MiddlewareNone
Analytics & ModelingNone
Functional ApplicationsNone
Cybersecurity & PrivacyModerate
Networks & ConnectivityNone
Processors & Edge IntelligenceNone
SensorsNone
Automation & ControlNone
RobotsNone
DronesNone
WearablesNone
ActuatorsNone
OtherNone

Similar Suppliers
Similar Suppliers

Partners
Partners