SlideShare a Scribd company logo
1 of 4
Download to read offline
VISIBILITY. INTELLIGENCE. RESPONSE.®
Wearedrivenbythebeliefthatwecanfundamentally
changethewaypeopleviewITsecuritychallengesand
improvetheirabilitytoprotecttheirdata.
ABOUT US
Rook Security is a provider of global IT security solutions protecting
sensitive data against dynamic, emerging threats. We help orga-
nizations develop effective cyber security programs by identifying
and remediating vulnerabilities and implementing comprehensive
security controls. Our advisory and managed security services de-
liver visibility, intelligence, and response®
to IT teams to overcome
the complex problems that continue to plague most organizations.
Acting as an integrated extension of their internal team, we work
with organizations from startups to Fortune 500 firms.
Our mission is to leverage emerging, cross-functional research,
state-of-the-art technology, and our scalable team of professionals
to provide our clients with global IT security solutions that decrease
negative outcomes, increase accountability, maximize business val-
ue, and challenge the status quo.
“Rook gets it! They understand IT Security & how it applies
to our business. We didn’t just get an audit, we established a
competitive advantage.” ­—EVP, GLOBAL MARKETING AGENCY
SOLUTION
INTEGRATION
We provide full, lifecycle
support for selecting, pro-
curing, and integrating the
best IT security solutions
for your environment.
u	 Technology Selection
u	 Procurement
u	 Implementation
u	 Health Check
u	 Technology
Development
“Rook has done a great job of anticipating our needs and being flexible enough
to respond to them. They have helped with everything from strategy to budget
to messaging, looking at our security needs holistically.” —DSO, F500 COMPANY
WHAT WE DO
OUTCOME-FOCUSED SECURITY™
We believe that every engagement we support should
result in actionable, decision-driving data that will help our
clients improve their security posture. By implementing and
managing controls that provide visibility, intelligence, and
response® capabilities, we are able to detect adversaries and
stop them before they can exfiltrate sensitive information or
competitive advantage.
ADVISORY
SERVICES
Consulting and Assess-
ment services to help
organizations establish
compliance frameworks,
privacy programs, secu-
rity policies, and overall
security postures.
u	 Strategy
u	 Assessments
u	 Penetration Testing
u	 Privacy
u	 Compliance
MANAGED
SECURITY SERVICES
Monitoring and response
services to help organizations
identify threats, remediate
gaps, and manage risk within
their security programs.
u	 Monitoring
u	 Managed Solutions
u	 Threat and Vulnerability
Management
u	 Threat Intelligence
u	 Incident Response
and Forensics
info@rooksecurity.com // rooksecurity.com // 888.712.9531	
120 E. Market Street, Suite 100 // Indianapolis, IN 46204
VISIBILITY. INTELLIGENCE. RESPONSE.®

More Related Content

What's hot

Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015patmisasi
 
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your CompanyPrivacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your CompanyKegler Brown Hill + Ritter
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity SolutionsErin Planting
 
Case study: Penetration Testing & Vulnerability Management - Happiest Minds
Case study: Penetration Testing & Vulnerability Management - Happiest MindsCase study: Penetration Testing & Vulnerability Management - Happiest Minds
Case study: Penetration Testing & Vulnerability Management - Happiest MindsHappiest Minds Technologies
 
Data Sheet - Services Overview
Data Sheet - Services OverviewData Sheet - Services Overview
Data Sheet - Services OverviewStefania G Gilea
 
Key Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingKey Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingeFolder
 
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Polsinelli PC
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your BusinessNeil Kemp
 
Case study: Managed Services for Network and Security Devices - Happiest Minds
Case study: Managed Services for Network and Security Devices - Happiest MindsCase study: Managed Services for Network and Security Devices - Happiest Minds
Case study: Managed Services for Network and Security Devices - Happiest MindsHappiest Minds Technologies
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costPECB
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessSecurityOn-Demand
 
A&I for Security Overview
A&I for Security OverviewA&I for Security Overview
A&I for Security OverviewA&I Solutions
 
A&I for Security
A&I for SecurityA&I for Security
A&I for SecurityJerry Recht
 
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019TechMeetups
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
 
It consulting san diego ca centrex it
It consulting san diego ca   centrex itIt consulting san diego ca   centrex it
It consulting san diego ca centrex itCentrexITSD
 
Gavin Reid - bio
Gavin Reid - bioGavin Reid - bio
Gavin Reid - bioGavin Reid
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
Protection You Need from the Partner You Trust
Protection You Need from the Partner You TrustProtection You Need from the Partner You Trust
Protection You Need from the Partner You TrustADP, LLC
 

What's hot (20)

Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your CompanyPrivacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity Solutions
 
Case study: Penetration Testing & Vulnerability Management - Happiest Minds
Case study: Penetration Testing & Vulnerability Management - Happiest MindsCase study: Penetration Testing & Vulnerability Management - Happiest Minds
Case study: Penetration Testing & Vulnerability Management - Happiest Minds
 
Data Sheet - Services Overview
Data Sheet - Services OverviewData Sheet - Services Overview
Data Sheet - Services Overview
 
Key Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingKey Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP Offering
 
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
Case study: Managed Services for Network and Security Devices - Happiest Minds
Case study: Managed Services for Network and Security Devices - Happiest MindsCase study: Managed Services for Network and Security Devices - Happiest Minds
Case study: Managed Services for Network and Security Devices - Happiest Minds
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
 
A&I for Security Overview
A&I for Security OverviewA&I for Security Overview
A&I for Security Overview
 
A&I for Security
A&I for SecurityA&I for Security
A&I for Security
 
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
Forcepoint exhibiting in Dublin Tech Job Fair Spring 2019
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
It consulting san diego ca centrex it
It consulting san diego ca   centrex itIt consulting san diego ca   centrex it
It consulting san diego ca centrex it
 
Gavin Reid - bio
Gavin Reid - bioGavin Reid - bio
Gavin Reid - bio
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
Protection You Need from the Partner You Trust
Protection You Need from the Partner You TrustProtection You Need from the Partner You Trust
Protection You Need from the Partner You Trust
 

Viewers also liked (7)

Momento memorable en mi vida
Momento memorable en mi vidaMomento memorable en mi vida
Momento memorable en mi vida
 
СМИшная газета - 2013
СМИшная газета - 2013СМИшная газета - 2013
СМИшная газета - 2013
 
Итоги фестиваля СМИшка-2013
Итоги фестиваля СМИшка-2013Итоги фестиваля СМИшка-2013
Итоги фестиваля СМИшка-2013
 
13 norma internacional de auditoría 250
13 norma internacional de auditoría 25013 norma internacional de auditoría 250
13 norma internacional de auditoría 250
 
Михаил Каменецкий
Михаил КаменецкийМихаил Каменецкий
Михаил Каменецкий
 
Presentacion ogenis-carillo
Presentacion ogenis-carilloPresentacion ogenis-carillo
Presentacion ogenis-carillo
 
La tarta de los números
La tarta de los númerosLa tarta de los números
La tarta de los números
 

Similar to Brochure - About Rook

Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Introdchadwick
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Kevin Hosey
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED Srinivasan M.S
 
Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123tommy62dm
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesOllie Whitehouse
 
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedThe 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedinsightssuccess2
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
VCISO | Virtual Chief Information Security | VCISO services - 2023
VCISO |  Virtual Chief Information Security | VCISO services - 2023VCISO |  Virtual Chief Information Security | VCISO services - 2023
VCISO | Virtual Chief Information Security | VCISO services - 2023Cyber Security Experts
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Falgun Rathod
 
Maven risk management services
Maven risk management servicesMaven risk management services
Maven risk management servicesRichard Mojel
 
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreCyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreClearedJobs.Net
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
About tipping edge consulting v1d
About tipping edge consulting v1dAbout tipping edge consulting v1d
About tipping edge consulting v1dMadhav Chablani
 
Adp global security trust the platform for business innovation
Adp global security   trust the platform for business innovationAdp global security   trust the platform for business innovation
Adp global security trust the platform for business innovationNathan Gazzard
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDClearedJobs.Net
 
Waystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdfWaystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdfJonathan White
 

Similar to Brochure - About Rook (20)

Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
 
Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory Services
 
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedThe 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressed
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
VCISO | Virtual Chief Information Security | VCISO services - 2023
VCISO |  Virtual Chief Information Security | VCISO services - 2023VCISO |  Virtual Chief Information Security | VCISO services - 2023
VCISO | Virtual Chief Information Security | VCISO services - 2023
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
 
Maven risk management services
Maven risk management servicesMaven risk management services
Maven risk management services
 
DEPL Consulting Brochure
DEPL Consulting BrochureDEPL Consulting Brochure
DEPL Consulting Brochure
 
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreCyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
 
IT solution
IT solutionIT solution
IT solution
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
About tipping edge consulting v1d
About tipping edge consulting v1dAbout tipping edge consulting v1d
About tipping edge consulting v1d
 
Adp global security trust the platform for business innovation
Adp global security   trust the platform for business innovationAdp global security   trust the platform for business innovation
Adp global security trust the platform for business innovation
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
 
Waystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdfWaystone Compliance - Global Product Suite 2023.pdf
Waystone Compliance - Global Product Suite 2023.pdf
 

Brochure - About Rook

  • 2. Wearedrivenbythebeliefthatwecanfundamentally changethewaypeopleviewITsecuritychallengesand improvetheirabilitytoprotecttheirdata. ABOUT US Rook Security is a provider of global IT security solutions protecting sensitive data against dynamic, emerging threats. We help orga- nizations develop effective cyber security programs by identifying and remediating vulnerabilities and implementing comprehensive security controls. Our advisory and managed security services de- liver visibility, intelligence, and response® to IT teams to overcome the complex problems that continue to plague most organizations. Acting as an integrated extension of their internal team, we work with organizations from startups to Fortune 500 firms. Our mission is to leverage emerging, cross-functional research, state-of-the-art technology, and our scalable team of professionals to provide our clients with global IT security solutions that decrease negative outcomes, increase accountability, maximize business val- ue, and challenge the status quo. “Rook gets it! They understand IT Security & how it applies to our business. We didn’t just get an audit, we established a competitive advantage.” ­—EVP, GLOBAL MARKETING AGENCY
  • 3. SOLUTION INTEGRATION We provide full, lifecycle support for selecting, pro- curing, and integrating the best IT security solutions for your environment. u Technology Selection u Procurement u Implementation u Health Check u Technology Development “Rook has done a great job of anticipating our needs and being flexible enough to respond to them. They have helped with everything from strategy to budget to messaging, looking at our security needs holistically.” —DSO, F500 COMPANY WHAT WE DO OUTCOME-FOCUSED SECURITY™ We believe that every engagement we support should result in actionable, decision-driving data that will help our clients improve their security posture. By implementing and managing controls that provide visibility, intelligence, and response® capabilities, we are able to detect adversaries and stop them before they can exfiltrate sensitive information or competitive advantage. ADVISORY SERVICES Consulting and Assess- ment services to help organizations establish compliance frameworks, privacy programs, secu- rity policies, and overall security postures. u Strategy u Assessments u Penetration Testing u Privacy u Compliance MANAGED SECURITY SERVICES Monitoring and response services to help organizations identify threats, remediate gaps, and manage risk within their security programs. u Monitoring u Managed Solutions u Threat and Vulnerability Management u Threat Intelligence u Incident Response and Forensics
  • 4. info@rooksecurity.com // rooksecurity.com // 888.712.9531 120 E. Market Street, Suite 100 // Indianapolis, IN 46204 VISIBILITY. INTELLIGENCE. RESPONSE.®