Home » Print Download PDF

Security Services

Secure Ninja provides high quality information security assessment services that provide the customer with clear and concise risk information. Each of Secure Ninja’s offerings assesses the security posture of key technology layers within an organization’s environment. Each engagement is delivered by a team of experienced security professionals that leverage cutting edge technology and a proven methodology.

To discuss how Secure Ninja can help your organization tackle your security challenges call 1 703 535 8600 x 16 or fill out the form to the left with your requirements.

Web Application Security

The demands of the marketplace are pushing business-critical applications and processes to the edge of the network perimeter where they are exposed to the Internet, business partners, and customers via web based applications. The organization demands assurance that the applications provide secure and continuous service. [...Read More]


In many organizations modems remain an unchecked vulnerability. All of the VPNs, firewalls, and other network security controls won't stop someone from accessing the network via an insecure modem. Secure Ninja's Wardialing service scans all of the organization's telephone dial in numbers looking for modems, fax machines, PBX's, etc. This allows the customer to understand their risk from out of band connections. [...Read More]

Vulnerability Testing

Regulatory pressures as well as the risk of data loss have caused organizations to take a closer look at the security of their infrastructure. Secure Ninja's Vulnerability Assessment allows the customer to better understand their security posture both from the Internet and the internal network. This answers several key questions: [...Read More]

Penetration Testing

Has your organization's investment in security had an impact? Are currently deployed security controls effective? If an attacker compromised your network what is the impact? Penetration testing simulates an attack by real-world threat agents. Secure Ninja will employ the same tools, techniques and methods used by determined attacks to probe, test, and penetrate your defenses.

The Penetration test employees the following techniques to test your organization's defenses: [...Read More]

Source Code Review

A security source code review assesses the security of an application by examining source code.  Secure Ninja’s code review methodology assesses the people, the processes, and the technologies in each application.  By evaluating each layer of the application, the development process, and the developers themselves, Secure Ninja can identify critical flaws, can determine the root cause of such flaws, and can construct cost-effective recommendations for remediation.  [...Read More]

Wireless Security

Assesses the security posture of an organization’s wireless network.  A Wireless Vulnerability Assessment provides an organization validation of current security controls protecting the wireless network, and provides a point in time assessment of the risks posed by the wireless network. [...Read More]

Policy & Precedure Review

The Secure Ninja Policy & Procedure Review examines the policies and procedures that are the management and operational framework of the enterprise. Secure Ninja will examine current policies for gaps and, if required, assist the client in creation of new policy.  [...Read More]

Incident Response

When a security incident occurs, an efficient and organized response is key to minimizing negative impacts and preserving key evidence. Secure Ninja works with the customers to formulate a tactical and strategic response plan. First, Secure Ninja assesses the situation to understand the scope of the incident. Secure Ninja then formulates a containment strategy to prevent further loss. Once the most severe issues have been addressed, Secure Ninja works with the client to analyze the impact of the breach and develop a remediation plan. [...Read More]

Get More Information


Interested in (Courses)

IT Security Training Promotion
The CISSP training course we took was excellent. The knowledge, experience and expertise that Clement brought to the classroom was truly amazing and the way he applied his extensive experience into classroom lessons was remarkable! I didn't think it...
Fazli Azad, Freddie Mac, "CISSP"
Read More Testimonials ...