IthacaLabs™ is Odyssey’s very own world-class Information Security Research & Threat Intelligence Center. Operating out of our state-of-the-art Information Security Lab, our research team is a group of specialized information security engineers and researchers who scout the global Information Security environment to deliver a rich Threat Intelligence resource pool. This provides organizations with unique visibility into existing and emerging threats, and enables them to effectively respond to those applicable to their environment.
ODYSSEY ITHACALABS™ RED TEAM SERVICES
A Red Teaming engagement is a simulation of real-world cyberattacks against your organization that aims to test the readiness, resilience & response capability of your people, processes and technology, on a technological and premises accessibility level. Weaknesses spotted are presented in a comprehensive report along with detailed recommendations on how to address them.
SECURITY ARCHITECTURE / CONFIGURATION EFFECTIVENESS ASSESSMENT
Security Architecture / Configuration Effectiveness refers to the ability of a security device to respond accurately and efficiently to a wide range of common threats, and to provide comprehensive protection against threats targeting specific applications.
WIRELESS NETWORK PENETRATION TEST
A Wireless assessment is a simulation of real-world attacks that involves authorized persons’ use of attacking methods mimicking cybercriminals’ techniques. Wireless Network Penetration Testing is designed to answer what is the real-world effectiveness of your existing security controls against an active, human, skilled cybercriminal.
MANAGED DATABASE AUDITING & PROTECTION
The consequences of inadequate maintenance, management and round-the-clock monitoring of an organization’s DAP/DAM technologies can range from unauthorized network access to data theft and compliance penalties.
MOBILE APPLICATION VULNERABILITY ASSESSMENT
Mobile Application Vulnerability Assessment services proactively detect critical exposures in operating systems, services and applications across your mobile enterprise, to identify how protective measures might be misused, mismanaged, attacked, or incorrectly configured.
SECURE CODE REVIEW
Secure Code Review means detecting and remediating coding flaws before they emerge as serious cybersecurity risks. If conducted properly and on an ongoing basis, code review can safeguard your organization’s software applications to a great extent.
PCI ASV SCANNING
Vulnerability Assessment services proactively detect critical exposures in operating systems, services and applications across your Cardholder Data Environment (CDE), seeking to identify how protective measures might be misused, mismanaged, attacked, or incorrectly configured.
INCIDENT RESPONSE & DIGITAL FORENSICS
Incident response and digital forensics include response to incidents, help with remediation and retrieval of meaningful forensics such as vital information related to actual use, consumption and access of services, alongside with location, time stamps and more, all of which are required to uncover threat patterns.
Social Engineering describes a non-technical type of intrusion that relies heavily on human interaction.
ETHICAL HACKING (BLACK & WHITE BOX)
Ethical Hacking is designed to answer how effective your existing security controls are against an active, human, skilled cybercriminal in the real world. Ethical Hacking exercises focus on the external perimeter of the organization and proactively identify critical exposures in operating systems, services and applications across your enterprise.
A Vulnerability Assessment is the regular process of identifying, quantifying and prioritizing the vulnerabilities in a system, an application or a network component. It seeks to identify how protective measures might be misused, mismanaged, attacked, or incorrectly configured.