IthacaLabs

ITHACALABS™

IthacaLabs™ is Odyssey’s very own world-class Information Security Research & Threat Intelligence Center. Operating out of our state-of-the-art Information Security Lab, our research team is a group of specialized information security engineers and researchers who scout the global Information Security environment to deliver a rich Threat Intelligence resource pool. This provides organizations with unique visibility into existing and emerging threats, and enables them to effectively respond to those applicable to their environment.

ODYSSEY ITHACALABS™ RED TEAM SERVICES

A Red Teaming engagement is a simulation of real-world cyberattacks against your organization that aims to test the readiness, resilience & response capability of your people, processes and technology, on a technological and premises accessibility level. Weaknesses spotted are presented in a comprehensive report along with detailed recommendations on how to address them.

SECURITY ARCHITECTURE / CONFIGURATION EFFECTIVENESS ASSESSMENT

Security Architecture / Configuration Effectiveness refers to the ability of a security device to respond accurately and efficiently to a wide range of common threats, and to provide comprehensive protection against threats targeting specific applications.

WIRELESS NETWORK PENETRATION TEST

A Wireless assessment is a simulation of real-world attacks that involves authorized persons’ use of attacking methods mimicking cybercriminals’ techniques. Wireless Network Penetration Testing is designed to answer what is the real-world effectiveness of your existing security controls against an active, human, skilled cybercriminal.

MANAGED DATABASE AUDITING & PROTECTION

The consequences of inadequate maintenance, management and round-the-clock monitoring of an organization’s DAP/DAM technologies can range from unauthorized network access to data theft and compliance penalties.

MOBILE APPLICATION VULNERABILITY ASSESSMENT

Mobile Application Vulnerability Assessment services proactively detect critical exposures in operating systems, services and applications across your mobile enterprise, to identify how protective measures might be misused, mismanaged, attacked, or incorrectly configured.

SYSTEMS & APPLICATIONS HARDENING

Hardening your organization’s systems is one of the most important tasks you need to undertake towards securing your sensitive data and information.

SECURE CODE REVIEW

Secure Code Review means detecting and remediating coding flaws before they emerge as serious cybersecurity risks. If conducted properly and on an ongoing basis, code review can safeguard your organization’s software applications to a great extent.

PCI ASV SCANNING

Vulnerability Assessment services proactively detect critical exposures in operating systems, services and applications across your Cardholder Data Environment (CDE), seeking to identify how protective measures might be misused, mismanaged, attacked, or incorrectly configured.

INCIDENT RESPONSE & DIGITAL FORENSICS

Incident response and digital forensics include response to incidents, help with remediation and retrieval of meaningful forensics such as vital information related to actual use, consumption and access of services, alongside with location, time stamps and more, all of which are required to uncover threat patterns.

SOCIAL ENGINEERING

Social Engineering describes a non-technical type of intrusion that relies heavily on human interaction.

ETHICAL HACKING (BLACK & WHITE BOX)

Ethical Hacking is designed to answer how effective your existing security controls are against an active, human, skilled cybercriminal in the real world. Ethical Hacking exercises focus on the external perimeter of the organization and proactively identify critical exposures in operating systems, services and applications across your enterprise.

VULNERABILITY ASSESSMENT

A Vulnerability Assessment is the regular process of identifying, quantifying and prioritizing the vulnerabilities in a system, an application or a network component. It seeks to identify how protective measures might be misused, mismanaged, attacked, or incorrectly configured.

Talk with an Expert

For any questions or requests please submit your details to receive a message or a call from one of our security experts.