SlideShare a Scribd company logo
1 of 2
Download to read offline
CORPORATE OVERVIEW
GuidePoint Security, LLC  •  2201 Cooperative Way, Suite 225, Herndon, VA 20171  • www.guidepointsecurity.com •  info@guidepointsecurity.com  •  (877) 889-0132
GuidePoint Security’s innovative Information Security solutions and proven expertise
enable our federal and commercial clients to more effectively and efficiently combat
threats to users, data, and network infrastructure. We deliver precise technologies and
services that integrate and align with our clients’ security policies, business processes,
and budget requirements.
We Secure Your Environment and Protect Your Organization
PRODUCT SOLUTIONS
GuidePoint Security offers best-of-breed technologies to protect the confidentiality,
integrity, and availability of our clients’ users, data, and networks. This includes daily
operational security technologies to emerging and innovative technologies for dynamic
risk-averse environments. We leverage 50+ industry-proven partners to meet our clients’
security technology objectives.
CONSULTING SERVICES
GuidePoint Security prides itself on hiring and retaining the best and brightest in the
Information Security industry. From emerging threats to regulatory mandates, our
professionals work side-by-side with clients to provide a complete understanding of their
current threat landscape and to implement the best technical and procedural solutions to
achieve business goals and objectives.
MANAGED SECURITY SERVICES
GuidePoint Security’s seasoned security analysts and incident responders combine forces
with broad threat intelligence and a comprehensive suite of technologies and services
to provide real-time threat monitoring, analysis, and response. We enable our clients to
strengthen their security posture while fully recognizing the return on investment on their
Information Security technologies.
GuidePoint Security, LLC  •  2201 Cooperative Way, Suite 225, Herndon, VA 20171  • www.guidepointsecurity.com •  info@guidepointsecurity.com  •  (877) 889-0132
MARKET POSITION
Founded by veterans of the Information
Security industry, GuidePoint is a
national Information Security provider
that employs a seasoned management,
engineering, and sales team with more
than 15 years of industry experience.
US REGIONS
GUIDEPOINT SECURITY SOLUTIONS AND OFFERINGS
Product
Solutions
We offer our customers technologies that address the following security requirements:
•	 Application Delivery
•	 Content Filtering
•	 Identity Access Management
•	 Network Analytics and Visibility
•	 Intrusion Prevention/
Detection
•	 Application Security
•	 Data Loss Prevention
•	 Vulnerability Management
•	 Governance Risk and
Compliance
•	 Security Operations Center
•	 Endpoint Threat Detection and
Response
•	 Authentication
•	 Remote Access/VPN
•	 Mobile Device Security
•	 Security Information /Event
Management
•	 User Behavior Analytics
Information
Assurance
Our industry-recognized team of professional services support the following practices:
•	 CISO Advisory Services
•	 Real-World Attack Simulation
•	 Threat and Vulnerability
Management
•	 Vendor Security Management
•	 Secure Development Training
•	 Security Governance and Risk
Management
•	 PCI DSS Compliance
•	 HIPAA/HITRUST Compliance
•	 Application Security
•	 Data Security and Privacy
•	 Digital Forensics and Incident
Response
Technology
Integration
Our security integration professionals are certified to perform the following core competencies:
Managed
Services
Key considerations of our managed vSOC services include:
•	 Response times and service level
agreements from time of validation
•	 Volume-based pricing, rather than per device
pricing
•	 Customer maintains ownership and
accessibility to data
•	 Ability to leverage the power and scalability
of cloud computing, including portability
­¢ Northeast
¢ Northwest
¢ Delaware Valley
¢ Four Corners
¢ Mid-Atlantic
¢ Southeast
¢ Carolinas
¢ Texas
¢ Southwest
¢ Heartland
¢ Ohio Valley
¢ Great Lakes
CONTACT US
info@guidepointsecurity.com
(877) 889-0132
www.guidepointsecurity.com
•	 Security Architectecture Review and Planning
•	 Security Operations Center
•	 Security Technology Effectiveness Review
•	 Application Delivery Services
•	 SIEM and Data Analytics
•	 Security Technology Evaluation

More Related Content

What's hot

IANS 2015 RSA Presentation
IANS 2015 RSA PresentationIANS 2015 RSA Presentation
IANS 2015 RSA PresentationAndrew Sanders
 
A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...Dimitrios Stergiou
 
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Schellman & Company
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMatePECB
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
Iso 27001 lead implementer training
Iso 27001 lead implementer trainingIso 27001 lead implementer training
Iso 27001 lead implementer trainingInfosecTrain
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCITpreneurs
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?Terro White
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security TestingPECB
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAmazon Web Services
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataBitglass
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Ollie Whitehouse
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoringjohandev
 
Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015Bill Haase
 
I365 presentation
I365 presentationI365 presentation
I365 presentationMCS621
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive SecurityBlueliv
 

What's hot (20)

IANS 2015 RSA Presentation
IANS 2015 RSA PresentationIANS 2015 RSA Presentation
IANS 2015 RSA Presentation
 
A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...A day in the life of a CISO (and advice for people looking to come into the C...
A day in the life of a CISO (and advice for people looking to come into the C...
 
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
Locking Up Your Cloud Environment: An Introduction to ISO/IEC 27017 and 27018
 
Conquest Security Capabilities
Conquest Security CapabilitiesConquest Security Capabilities
Conquest Security Capabilities
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
Iso 27001 lead implementer training
Iso 27001 lead implementer trainingIso 27001 lead implementer training
Iso 27001 lead implementer training
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?
 
Cyber Security Testing
Cyber Security TestingCyber Security Testing
Cyber Security Testing
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoring
 
Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015
 
I365 presentation
I365 presentationI365 presentation
I365 presentation
 
CV 2.4 18/06/2016
CV 2.4 18/06/2016CV 2.4 18/06/2016
CV 2.4 18/06/2016
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive Security
 

Similar to GPS - Corporate Overview

CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud SecurityIT Governance Ltd
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium SolutionsSecurium solutions
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Companykeshavsecurium
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solukeshavsecurium
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profileIrfan Ullah
 
About graycon
About grayconAbout graycon
About grayconmartyrj
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Introdchadwick
 
Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet OverviewDebbie Lovis
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailJoe Zuramski
 

Similar to GPS - Corporate Overview (20)

CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud Security
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium Solutions
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solu
 
Vynxgroup profile
Vynxgroup profileVynxgroup profile
Vynxgroup profile
 
About graycon
About grayconAbout graycon
About graycon
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Highstreet Overview
Highstreet OverviewHighstreet Overview
Highstreet Overview
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemail
 

GPS - Corporate Overview

  • 1. CORPORATE OVERVIEW GuidePoint Security, LLC  •  2201 Cooperative Way, Suite 225, Herndon, VA 20171  • www.guidepointsecurity.com •  info@guidepointsecurity.com  •  (877) 889-0132 GuidePoint Security’s innovative Information Security solutions and proven expertise enable our federal and commercial clients to more effectively and efficiently combat threats to users, data, and network infrastructure. We deliver precise technologies and services that integrate and align with our clients’ security policies, business processes, and budget requirements. We Secure Your Environment and Protect Your Organization PRODUCT SOLUTIONS GuidePoint Security offers best-of-breed technologies to protect the confidentiality, integrity, and availability of our clients’ users, data, and networks. This includes daily operational security technologies to emerging and innovative technologies for dynamic risk-averse environments. We leverage 50+ industry-proven partners to meet our clients’ security technology objectives. CONSULTING SERVICES GuidePoint Security prides itself on hiring and retaining the best and brightest in the Information Security industry. From emerging threats to regulatory mandates, our professionals work side-by-side with clients to provide a complete understanding of their current threat landscape and to implement the best technical and procedural solutions to achieve business goals and objectives. MANAGED SECURITY SERVICES GuidePoint Security’s seasoned security analysts and incident responders combine forces with broad threat intelligence and a comprehensive suite of technologies and services to provide real-time threat monitoring, analysis, and response. We enable our clients to strengthen their security posture while fully recognizing the return on investment on their Information Security technologies.
  • 2. GuidePoint Security, LLC  •  2201 Cooperative Way, Suite 225, Herndon, VA 20171  • www.guidepointsecurity.com •  info@guidepointsecurity.com  •  (877) 889-0132 MARKET POSITION Founded by veterans of the Information Security industry, GuidePoint is a national Information Security provider that employs a seasoned management, engineering, and sales team with more than 15 years of industry experience. US REGIONS GUIDEPOINT SECURITY SOLUTIONS AND OFFERINGS Product Solutions We offer our customers technologies that address the following security requirements: • Application Delivery • Content Filtering • Identity Access Management • Network Analytics and Visibility • Intrusion Prevention/ Detection • Application Security • Data Loss Prevention • Vulnerability Management • Governance Risk and Compliance • Security Operations Center • Endpoint Threat Detection and Response • Authentication • Remote Access/VPN • Mobile Device Security • Security Information /Event Management • User Behavior Analytics Information Assurance Our industry-recognized team of professional services support the following practices: • CISO Advisory Services • Real-World Attack Simulation • Threat and Vulnerability Management • Vendor Security Management • Secure Development Training • Security Governance and Risk Management • PCI DSS Compliance • HIPAA/HITRUST Compliance • Application Security • Data Security and Privacy • Digital Forensics and Incident Response Technology Integration Our security integration professionals are certified to perform the following core competencies: Managed Services Key considerations of our managed vSOC services include: • Response times and service level agreements from time of validation • Volume-based pricing, rather than per device pricing • Customer maintains ownership and accessibility to data • Ability to leverage the power and scalability of cloud computing, including portability ­¢ Northeast ¢ Northwest ¢ Delaware Valley ¢ Four Corners ¢ Mid-Atlantic ¢ Southeast ¢ Carolinas ¢ Texas ¢ Southwest ¢ Heartland ¢ Ohio Valley ¢ Great Lakes CONTACT US info@guidepointsecurity.com (877) 889-0132 www.guidepointsecurity.com • Security Architectecture Review and Planning • Security Operations Center • Security Technology Effectiveness Review • Application Delivery Services • SIEM and Data Analytics • Security Technology Evaluation