{"id":213,"date":"2017-03-21T21:50:27","date_gmt":"2017-03-21T21:50:27","guid":{"rendered":"http:\/\/zed.inguardians.com\/?page_id=213"},"modified":"2020-05-07T18:05:02","modified_gmt":"2020-05-08T01:05:02","slug":"services","status":"publish","type":"page","link":"https:\/\/zed.inguardians.com\/services\/","title":{"rendered":"Services"},"content":{"rendered":"

[et_pb_section fb_built=”1″ fullwidth=”on” admin_label=”Feature” _builder_version=”3.25.4″ background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2017\/03\/midtop_bg.jpg” parallax=”on” custom_margin=”|0px||” custom_padding=”0px|0|0px|0px|false|false” border_radii=”||||” locked=”off”][et_pb_fullwidth_header title=”Our Services” header_image_url=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/08\/APT.png” _builder_version=”4.2.2″ title_level=”h2″ title_font=”Arial||||||||” title_font_size=”48px” title_line_height=”1.2em” content_font=”Open Sans||||||||” content_font_size=”18px” content_line_height=”1.8em” subhead_font=”||||||||” background_color=”rgba(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,72,114,0.9)” background_color_gradient_end=”rgba(41,73,112,0.55)” background_color_gradient_direction=”140deg” background_color_gradient_overlays_image=”on” parallax=”on” parallax_method=”on” custom_button_one=”on” button_one_text_size=”15px” button_one_text_color=”#294970″ button_one_bg_color=”#ffffff” button_one_border_width=”0px” button_one_border_color=”#ffa727″ button_one_border_radius=”100px” button_one_letter_spacing=”5px” button_one_font=”Open Sans|700||on|||||” button_one_use_icon=”off” custom_margin=”|||” custom_padding=”100px||100px||true” custom_padding_tablet=”|||” custom_padding_phone=”|||” custom_padding_last_edited=”off|desktop” hover_enabled=”0″ title_font_size_tablet=”” title_font_size_phone=”36px” title_font_size_last_edited=”on|desktop” content_font_size_tablet=”” content_font_size_phone=”16px” content_font_size_last_edited=”on|phone” button_one_text_size_last_edited=”off|desktop” button_two_text_size_tablet=”” button_two_text_size_phone=”” button_two_text_size_last_edited=”on|desktop” button_one_border_color_hover=”#ff8a3d” button_one_border_radius_hover=”100px” button_one_letter_spacing_hover=”5px” button_one_bg_color_hover=”#ff8a3d” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”on” button_one_border_color__hover=”#ff8a3d” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”on” button_one_border_radius__hover=”100px” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”on” button_one_letter_spacing__hover=”5px” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”on” button_one_bg_color__hover=”#ff8a3d” button_two_bg_color__hover_enabled=”off”]<\/p>\n

Our specialties include Red Team Penetration Testing, Hardware, Application Security Assessments, Threat Hunting, Security Architecture Reviews, ICS and IIoT Security, \u00a0Kubernetes and Public Cloud Security, Incident Response, Custom Training, and more.<\/p>\n

[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”schedules section” _builder_version=”4.2.2″ background_color_gradient_direction=”37deg” background_enable_image=”off” parallax=”on” parallax_method=”off” custom_padding=”46px||100px||false|false” animation_style=”zoom” animation_intensity_zoom=”10%”][et_pb_row column_structure=”1_4,3_4″ admin_label=”Class” _builder_version=”3.25″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)”][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%80%%” icon_color=”#294970″ use_circle=”on” circle_color=”rgba(41,73,112,0.55)” use_circle_border=”on” circle_border_color=”rgba(41,73,112,0.55)” content_max_width=”533px” _builder_version=”4.2.2″ width=”75%” max_width=”100%” module_alignment=”center” min_height=”121px” height=”100px” max_height=”1000px” custom_margin=”0px||” custom_margin_tablet=”9px||||false|false” custom_margin_phone=”3px||||false|false” custom_margin_last_edited=”on|tablet” custom_padding=”19px||64px||false|false” custom_padding_tablet=”15px||50px||false|false” custom_padding_phone=”|0px|16px|0px|false|false” custom_padding_last_edited=”on|tablet” hover_enabled=”0″ module_alignment_tablet=”” module_alignment_phone=”” module_alignment_last_edited=”on|phone”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”3_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.2.2″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_font=”||||||||” header_3_font=”|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” hover_enabled=”0″ locked=”off” custom_padding=”||28px||false|false” custom_margin=”17px||-7px||false|false”]<\/p>\n

Offensive Services<\/strong><\/a><\/h3>\n

Mission-Oriented Threat Emulation<\/strong><\/p>\n

InGuardians Offensive Services focus on testing an organization\u2019s readiness to detect, deter, and withstand attacks.\u00a0\u00a0Our Offensive Services Team utilize offensive tactics, techniques, and procedures to gain access to an organization\u2019s critical assets. \u00a0The underlying philosophy behind all of InGuardians Offensive Services is to \u201cmodel the threat\u201d.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ admin_label=”Class” _builder_version=”3.25″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)”][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%228%%” icon_color=”#294970″ use_circle=”on” circle_color=”rgba(41,73,112,0.55)” use_circle_border=”on” circle_border_color=”rgba(41,73,112,0.55)” content_max_width=”553px” _builder_version=”4.2.2″ width=”75%” max_width=”100%” module_alignment=”center” min_height=”121px” height=”100px” max_height=”1000px” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”33px||81px||false|false” hover_enabled=”0″][\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=”4.2.2″ type=”3_4″][et_pb_text _builder_version=”4.2.2″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_font=”||||||||” header_3_font=”|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” hover_enabled=”0″ locked=”off” custom_padding=”||39px||false|false”]<\/p>\n

Protective Services<\/strong><\/a><\/h3>\n

Prevention, detection, and containment<\/strong><\/p>\n

InGuardians Protective Services Team delivers expert guidance to your IT employees, stakeholders, and management in order to better defend their assets against targeted threats. \u00a0In addition to Proactive Hardening and Security Architecture Services, InGuardians Protective Services also include\u00a0 Threat Hunting and Incident Response.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ admin_label=”Class” _builder_version=”3.25″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)”][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%176%%” icon_color=”#294970″ use_circle=”on” circle_color=”rgba(41,73,112,0.55)” use_circle_border=”on” circle_border_color=”rgba(41,73,112,0.55)” _builder_version=”4.2.2″ custom_margin=”0px||” custom_padding=”20px||32px||false|false” hover_enabled=”0″][\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=”4.2.2″ type=”3_4″][et_pb_text _builder_version=”4.2.2″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_font=”||||||||” header_3_font=”|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” hover_enabled=”0″ locked=”off” custom_padding=”||52px||false|false” custom_margin=”11px||-20px||false|false”]<\/p>\n

ICS and IIoT Security\u00a0<\/strong><\/a><\/h3>\n

InGuardians Utilisec team brings decades of deep technical and executive experience to bear on ICS and Smart Grid projects. Our experience ranges from low-level hardware analysis to national policy development. InGuardians Utilisec Team members have built the tools, developed the methodologies, and delivered the training that our industry uses to test ICS environments. Our core services in ICS are hardware analysis, security architecture reviews, and custom training.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ admin_label=”Class” _builder_version=”3.25″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)”][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%97%%” icon_color=”#294970″ use_circle=”on” circle_color=”rgba(41,73,112,0.55)” use_circle_border=”on” circle_border_color=”rgba(41,73,112,0.55)” _builder_version=”4.2.2″ custom_padding=”55px||51px||false|false” hover_enabled=”0″][\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=”4.2.2″ type=”3_4″][et_pb_text _builder_version=”4.2.2″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_font=”||||||||” header_3_font=”|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” hover_enabled=”0″ locked=”off” custom_margin=”7px||||false|false” custom_padding=”||47px||false|false”]<\/p>\n

Cloud Security<\/strong><\/a><\/h3>\n

InGuardians is recognized as a leader in cloud and container security. The InGuardians team delivers talks and training on Kubernetes and container security at top industry conferences like RSA and the Black Hat Briefings.<\/p>\n

InGuardians has served as members of the Kubernetes project Security Audit Working Group and includes a Kubernetes project contributor. The team has also developed Open Source projects for Kubernetes, including\u00a0Peirates<\/a>, a Kubernetes penetration testing tool, and\u00a0Bustakube<\/a>, an intentionally-vulnerable Kubernetes cluster built as a teaching tool.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ admin_label=”Class” _builder_version=”3.25″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)”][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%126%%” icon_color=”#294970″ use_circle=”on” circle_color=”rgba(41,73,112,0.55)” use_circle_border=”on” circle_border_color=”rgba(41,73,112,0.55)” _builder_version=”4.2.2″ custom_padding=”81px||81px||false|false” hover_enabled=”0″ custom_padding_last_edited=”on|tablet” custom_padding_tablet=”39px||||false|false” custom_margin=”||-59px||false|false”][\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=”4.2.2″ type=”3_4″][et_pb_text _builder_version=”4.2.2″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_font=”||||||||” header_3_font=”|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” hover_enabled=”0″ locked=”off” custom_padding=”1px||46px||false|false” custom_margin=”13px||||false|false”]<\/p>\n

Executive Services<\/strong><\/a><\/h3>\n

InGuardians offers a variety of services tailored specifically for executives. If you are unsure of your business needs, InGuardians can assess your enterprise security posture and assist with identifying strategic decision points. <\/span><\/p>\n

In addition to our executive services, InGuardians offers a set of educational resources, such as the Weekly Executive Brief<\/a> and InfosecFIVE\u2122.\u00a0<\/span><\/p>\n

InGuardians\u2019 Weekly Executive Brief is a concise executive summary of one of the topics our team has identified as a top priority of the week. InfosecFIVE\u2122 includes a curated set of short, five-minute presentations on key Information Security terms and issues that our team has developed specifically for executives.<\/span><\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,3_4″ admin_label=”Class” _builder_version=”3.25″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)”][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%173%%” icon_color=”#294970″ use_circle=”on” circle_color=”rgba(41,73,112,0.55)” use_circle_border=”on” circle_border_color=”rgba(41,73,112,0.55)” _builder_version=”4.2.2″ custom_padding=”24px||21px||false|false” hover_enabled=”0″][\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=”4.2.2″ type=”3_4″][et_pb_text _builder_version=”4.2.2″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_font=”||||||||” header_3_font=”|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” hover_enabled=”0″ locked=”off” custom_padding=”1px||35px||false|false” custom_margin=”9px||||false|false”]<\/p>\n

Custom Training<\/strong><\/a><\/h3>\n

<\/span><\/p>\n

Training is at InGuardians\u2019 core. Our founders\u00a0have developed industry-leading courses in the areas of penetration testing, ICS and Hardware hacking, RF and Wireless hacking and incident response.<\/p>\n

While we offer some of the classes through SANS and various infosec conferences, all of our classes are available for private training.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”off|desktop” admin_label=”Footer” _builder_version=”3.25.4″ use_background_color_gradient=”on” background_color_gradient_start=”#004872″ background_color_gradient_end=”rgba(22,77,132,0.62)” background_color_gradient_direction=”140deg” background_color_gradient_overlays_image=”on” background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2017\/03\/midtop_bg.jpg” custom_margin=”|||” custom_padding=”120px|0px|120px|0px|true|false” custom_padding_tablet=”10vw||10vw||true” custom_padding_phone=”5vw||5vw||true” locked=”off”][et_pb_row use_custom_gutter=”on” _builder_version=”3.25″ custom_padding=”|||” use_custom_width=”on”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”3.27.4″ text_font=”||||||||” text_text_color=”#ffffff” background_layout=”dark”]<\/p>\n

\n
\n
\n
\n

InGuardians Inc.<\/h4>\n
\n

Phone<\/b>: +1.202.448.8958
\nFax<\/b>: +1.202.318.0235
\nBusiness Hours<\/b>: Infosec never sleeps
\nAddress<\/b>: 5614 Connecticut Ave, NW #313, Washington, D.C. 20015-2604<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n

\n
\n
\n
\n

Email Contacts<\/h4>\n
\n

General Inquiries<\/b>\u00a0 \u00a0 \u00a0 contact@inguardians.com
\nService Inquries<\/b>\u00a0 \u00a0 \u00a0 \u00a0 security@inguardians.com
\nSales Inquiries<\/b>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 sales@inguardians.com
\nPress Inquiries<\/b>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 press@inguardians.com<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Our specialties include Red Team Penetration Testing, Hardware, Application Security Assessments, Threat Hunting, Security Architecture Reviews, ICS and IIoT Security, \u00a0Kubernetes and Public Cloud Security, Incident Response, Custom Training, and more. Offensive Services Mission-Oriented Threat Emulation InGuardians Offensive Services focus on testing an organization\u2019s readiness to detect, deter, and withstand attacks.\u00a0\u00a0Our Offensive Services Team utilize […]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/pages\/213"}],"collection":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":60,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/pages\/213\/revisions"}],"predecessor-version":[{"id":3891,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/pages\/213\/revisions\/3891"}],"wp:attachment":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/media?parent=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}