SlideShare a Scribd company logo
1 of 14
Download to read offline
CYBERSECURITY SERVICES
3
About Abanacle
Cybersecurity threats to critical infrastructure continue to evolve at an
ever-increasing rate worldwide. Governments, corporations and individuals
are experiencing more sophisticated and prolific cyber-attacks on a regular
basis. It takes a cybersecurity company that remains vigilant, keeping
updated on the latest threats and defenses, to secure an entity.
Abanacle provides cybersecurity consulting services and training to
government agencies and private companies to prepare for and counteract
attacks to information security.
Abanacle Corp is a consortium of companies dedicated to the advancement
of security technology and biometric authentication. Abanacle’s experienced
and highly trained cybersecurity experts help our clients stay protected and
provide a portfolio of cybersecurity services that are tailored to meet any
organization’s security, privacy and regulatory requirements.
Our team consists of professionals who have been working in the field of
cybersecurity in North and South America, and are able to provide training
to customers at all levels, relevant threat assessments, as well as planning
and execution to implement the necessary course of action.
CONSULTING | TRAINING | CONSORTIUM |
SECURITY PRODUCTS
ABOUT ABANACLE
5
• Abanacle Corp provides a portfolio of cybersecurity services that are
tailored to meet an organization’s security, privacy, compliance and
regulatory requirements.
• Abanacle Corp provides cybersecurity consulting services, education and
training to government agencies and private companies, domestically and
internationally.
• Some key areas of cybersecurity services include:
- Security Consulting
- Penetration Testing
- Incident Response
- Security Assessment
- Security as a Service
- Compliance Preparedness
- Cybersecurity Certification & Training
- Secured Hardware Products for Identity Verification
& Biometric Authentication
SERVICES
MISSION READY FOR CYBERSECURITY
ABANACLE CORP
7
SECURE BIOMETRIC IDENTIFICATION AND CARDS
Abanacle has spent years in research and development of secure
identification cards. Originally developed to meet the specifications for
secure entry and exit of a country’s borders; they can also be used for
entry into secure locations like government facilities, medical and financial
institutions.
The cards have the ability to store encrypted personal information on
the user. More importantly, it can store numerous forms of biometric
authentication, such as fingerprints, facial recognition, retina scan and
voice recognition. We offer customized card solutions for biometric user
authentication which can serve as the universal identification for access,
authorization and identification.
Secure Payment Processing: Abanacle offers a product line of hardware
and software solutions that facilitates mobile payment processing and the
management of consumer credit information. This line of cards and card
readers can be used to substantially reduce banking and transaction fraud
throughout many different industries.
BIOMETRIC AUTHENTICATION FOR
IDENTITY & CONSUMER PAYMENTS
IDENTITY VERIFICATION
9
The ID MASS P235 System offers innovative and reliable technologies to
monitor control and protect government and private assets - both human and
material. The System was developed to fill gaps that exist in military and
first responder asset tracking and situational awareness.
When used in a non-military environment (e.g. by first responders) the
P235 System also provides an effective tool for protecting human assets,
managing manpower and resources. It is based on the Windows operating
system and is compatible with business management systems and hardware
commonly in use worldwide.
The System monitors the position, movement and well being of small teams
of independent assets, simultaneously and in real time. The views of each
individual system can be networked to track and monitor the safety of an
unlimited number of assets via a single Command and Control Center.
In the field, the assets’ data is presented to lead personnel via a hand-held
display. The same data can be transmitted from lead personnel to a Central
Command and Control Center to be integrated with other in-theater monitoring.
Each P235 System is composed of two electronic components: The
P235VIEW paired with multiple P235 COMM units. Data is transmitted
between units securely via a 256-bit encrypted wireless link.
ASSET TRACKING & SITUATIONAL AWARENESS
SYSTEM FOR ASSET TRACKING
& WORKFORCE MANAGEMENT
ID MASS P235 SYSTEM
HARDWARE & SOFTWARE
11
Cyber Assessments: Abanacle assesses users’ current cybersecurity policies,
procedures and technologies in order to provide them with a roadmap for
securing their networks. This service enables users to attain their security
objectives, whether these are following their industry’s best practices or
compliance with emerging guidelines and standards such as ISA99, NERC CIP,
CFATS and ISO27001.
Risk Assessments: The Abanacle risk assessment model reviews essential
cybersecurity areas and provides an in-depth look at systems, policies,
procedures, and configurations to identify any the gaps and weaknesses.
Vulnerability Scanning: Validating actual configurations and extracting detailed
information about potential risks is accomplished with specialized scanning on
a variety of government and industry regulations and parameters including: PCI,
DSS, NERC, FISMA, GLBA, and COPPA among many others.
Penetration Testing: Abanacle has some of the top penetration testing engineers
in the industry. Our service uncovers the “hidden” threats to an organization by
evaluating the system or network’s resistance to malicious attacks.
Design & Implementation: Through experience in the government and private
sectors, Abanacle tailors cybersecurity programs to address an organization’s
specific structure and compliance needs.
IT SERVICES & CONSULTING
CONSULTING SERVICES
CYBERSECURITY TREAT
PREVENTION & PROTECTION
13
Abanacle is partnering with Nova Southeastern (NSU) rated one of the top
information security schools in the U.S.; to advance the scope and reach of our
cybersecurity educational programs. NSU has been designated as a National
Center of Academic Excellence in Information Assurance Education for the
academic years 2005-2013 by the National Security Agency (NSA) and the
Department of Homeland Security (DHS) in the U.S.
NSU is a not-for-profit, independent university that is classified as a research
university with “high research activity” by the Carnegie Foundation for the
Advancement of Teaching, and is one of only 37 universities nationwide to also
be awarded Carnegie’s Community Engagement Classification. They have a
presence throughout Florida, the U.S. and nine countries around the world.
Abanacle and NSU are developing a technology incubator focused exclusively
on cybersecurity companies and technologies. To complement the incubator,
Abanacle and NSU will capitalize on commercializing research at the university
level, teaching cybersecurity educational classes and seminars and develop a
consortium of universities and corporations.
CYBERSECURITY TRAINING & EDUCATION
CYBERSECURITY TRAINING & EDUCATION
EDUCATIONAL PROGRAMS
www.abanacle.com

More Related Content

What's hot

Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Third-party Remote Support Threats Inforgraphic
Third-party Remote Support Threats InforgraphicThird-party Remote Support Threats Inforgraphic
Third-party Remote Support Threats InforgraphicSecureLink, Inc.
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Anton Chuvakin
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsSandeep Saxena
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistMatthew Rosenquist
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forwardNils Thulin
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security ArchitecturePriyanka Aash
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?sohailAhmad304
 

What's hot (20)

Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Third-party Remote Support Threats Inforgraphic
Third-party Remote Support Threats InforgraphicThird-party Remote Support Threats Inforgraphic
Third-party Remote Support Threats Inforgraphic
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security Metrics
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forward
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
CCA study group
CCA study groupCCA study group
CCA study group
 
From Business Architecture to Security Architecture
From Business Architecture to Security ArchitectureFrom Business Architecture to Security Architecture
From Business Architecture to Security Architecture
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?
 

Similar to Cybersecurity Services for Critical Infrastructure

OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED Srinivasan M.S
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015RAVI PRAKASH
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023CBIZ, Inc.
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 

Similar to Cybersecurity Services for Critical Infrastructure (20)

Cyber Security | Information Security
Cyber Security  | Information SecurityCyber Security  | Information Security
Cyber Security | Information Security
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Information Security
Information SecurityInformation Security
Information Security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 

Cybersecurity Services for Critical Infrastructure

  • 2.
  • 3. 3 About Abanacle Cybersecurity threats to critical infrastructure continue to evolve at an ever-increasing rate worldwide. Governments, corporations and individuals are experiencing more sophisticated and prolific cyber-attacks on a regular basis. It takes a cybersecurity company that remains vigilant, keeping updated on the latest threats and defenses, to secure an entity. Abanacle provides cybersecurity consulting services and training to government agencies and private companies to prepare for and counteract attacks to information security. Abanacle Corp is a consortium of companies dedicated to the advancement of security technology and biometric authentication. Abanacle’s experienced and highly trained cybersecurity experts help our clients stay protected and provide a portfolio of cybersecurity services that are tailored to meet any organization’s security, privacy and regulatory requirements. Our team consists of professionals who have been working in the field of cybersecurity in North and South America, and are able to provide training to customers at all levels, relevant threat assessments, as well as planning and execution to implement the necessary course of action. CONSULTING | TRAINING | CONSORTIUM | SECURITY PRODUCTS ABOUT ABANACLE
  • 4.
  • 5. 5 • Abanacle Corp provides a portfolio of cybersecurity services that are tailored to meet an organization’s security, privacy, compliance and regulatory requirements. • Abanacle Corp provides cybersecurity consulting services, education and training to government agencies and private companies, domestically and internationally. • Some key areas of cybersecurity services include: - Security Consulting - Penetration Testing - Incident Response - Security Assessment - Security as a Service - Compliance Preparedness - Cybersecurity Certification & Training - Secured Hardware Products for Identity Verification & Biometric Authentication SERVICES MISSION READY FOR CYBERSECURITY ABANACLE CORP
  • 6.
  • 7. 7 SECURE BIOMETRIC IDENTIFICATION AND CARDS Abanacle has spent years in research and development of secure identification cards. Originally developed to meet the specifications for secure entry and exit of a country’s borders; they can also be used for entry into secure locations like government facilities, medical and financial institutions. The cards have the ability to store encrypted personal information on the user. More importantly, it can store numerous forms of biometric authentication, such as fingerprints, facial recognition, retina scan and voice recognition. We offer customized card solutions for biometric user authentication which can serve as the universal identification for access, authorization and identification. Secure Payment Processing: Abanacle offers a product line of hardware and software solutions that facilitates mobile payment processing and the management of consumer credit information. This line of cards and card readers can be used to substantially reduce banking and transaction fraud throughout many different industries. BIOMETRIC AUTHENTICATION FOR IDENTITY & CONSUMER PAYMENTS IDENTITY VERIFICATION
  • 8.
  • 9. 9 The ID MASS P235 System offers innovative and reliable technologies to monitor control and protect government and private assets - both human and material. The System was developed to fill gaps that exist in military and first responder asset tracking and situational awareness. When used in a non-military environment (e.g. by first responders) the P235 System also provides an effective tool for protecting human assets, managing manpower and resources. It is based on the Windows operating system and is compatible with business management systems and hardware commonly in use worldwide. The System monitors the position, movement and well being of small teams of independent assets, simultaneously and in real time. The views of each individual system can be networked to track and monitor the safety of an unlimited number of assets via a single Command and Control Center. In the field, the assets’ data is presented to lead personnel via a hand-held display. The same data can be transmitted from lead personnel to a Central Command and Control Center to be integrated with other in-theater monitoring. Each P235 System is composed of two electronic components: The P235VIEW paired with multiple P235 COMM units. Data is transmitted between units securely via a 256-bit encrypted wireless link. ASSET TRACKING & SITUATIONAL AWARENESS SYSTEM FOR ASSET TRACKING & WORKFORCE MANAGEMENT ID MASS P235 SYSTEM HARDWARE & SOFTWARE
  • 10.
  • 11. 11 Cyber Assessments: Abanacle assesses users’ current cybersecurity policies, procedures and technologies in order to provide them with a roadmap for securing their networks. This service enables users to attain their security objectives, whether these are following their industry’s best practices or compliance with emerging guidelines and standards such as ISA99, NERC CIP, CFATS and ISO27001. Risk Assessments: The Abanacle risk assessment model reviews essential cybersecurity areas and provides an in-depth look at systems, policies, procedures, and configurations to identify any the gaps and weaknesses. Vulnerability Scanning: Validating actual configurations and extracting detailed information about potential risks is accomplished with specialized scanning on a variety of government and industry regulations and parameters including: PCI, DSS, NERC, FISMA, GLBA, and COPPA among many others. Penetration Testing: Abanacle has some of the top penetration testing engineers in the industry. Our service uncovers the “hidden” threats to an organization by evaluating the system or network’s resistance to malicious attacks. Design & Implementation: Through experience in the government and private sectors, Abanacle tailors cybersecurity programs to address an organization’s specific structure and compliance needs. IT SERVICES & CONSULTING CONSULTING SERVICES CYBERSECURITY TREAT PREVENTION & PROTECTION
  • 12.
  • 13. 13 Abanacle is partnering with Nova Southeastern (NSU) rated one of the top information security schools in the U.S.; to advance the scope and reach of our cybersecurity educational programs. NSU has been designated as a National Center of Academic Excellence in Information Assurance Education for the academic years 2005-2013 by the National Security Agency (NSA) and the Department of Homeland Security (DHS) in the U.S. NSU is a not-for-profit, independent university that is classified as a research university with “high research activity” by the Carnegie Foundation for the Advancement of Teaching, and is one of only 37 universities nationwide to also be awarded Carnegie’s Community Engagement Classification. They have a presence throughout Florida, the U.S. and nine countries around the world. Abanacle and NSU are developing a technology incubator focused exclusively on cybersecurity companies and technologies. To complement the incubator, Abanacle and NSU will capitalize on commercializing research at the university level, teaching cybersecurity educational classes and seminars and develop a consortium of universities and corporations. CYBERSECURITY TRAINING & EDUCATION CYBERSECURITY TRAINING & EDUCATION EDUCATIONAL PROGRAMS