<img alt="" src="https://secure.insightful-enterprise-intelligence.com/784283.png" style="display:none;">
Cybersecurity (26)

Keypoint Intelligence and Agile Cybersecurity Solutions (ACS)

Offering clients world-class security services
Staffed with the best security experts in the industry, ACS has been providing cybersecurity services to state, local, Department of Defense, and Intelligence Community clients. ACS is now providing the same cybersecurity rigor and expertise to SMB commercial clients.
What’s New in Security
Best Practices for Asset and Endpoint Management
Keypoint Intelligence's Anne Valaitis sits down with Chris Perry of Agile Cybersecurity Solutions (ACS) to talk about asset management and how it’s critical to protecting an entire digital ecosystem.
What Can Happen with Inadequate Endpoint Management
In conjunction with ACS (our cybersecurity testing and consulting partner), we discuss here the dangers of inadequate endpoint and IoT management, which can leave organizations vulnerable to all sorts of cyberattacks.
Crafting Your Cybersecurity Incident Response Plan
We discuss here the basics of a cybersecurity incident response plan, which is a comprehensive strategy that outlines the steps an organization will take to effectively detect, respond to, and recover from cyber incidents.
Layered 360° Security Protection
Assess
Security Integrity Audit
Your security assessment starts with our rigorous security integrity audit that will expose vulnerability of your in-house systems and networks, thus enabling to more effectively manage risks.
Mitigate
Consulting Services
As part of your assessment we will help you make decisions on how you can mitigate risk and provide you with solutions on solving security vulnerabilities discovered during your assessment / integrity audit.
Monitor
Managed Detection and Response
Managed Detection and Response is a service that combines continuous monitoring of your business's digital assets with an "always-on" certified incident response team to defend your network to first prevent, and ultimately to respond to, a cyberattack.
Consult
Virtual CISO Services
Our Virtual CISO (Chief Information Security Officer) mission is to offer you solutions and services to enable business growth, provide improvements in productivity and efficiency, and protect information as it flows inside and outside of an organization.
Additional Security Services
Office Hardware/IoT Penetration Testing (for manufacturers)– Any network-connected device —including copiers, printers, security cameras, thermostat controls—can be a target for hackers. Our penetration security test benchmark has been proven to help identify security vulnerabilities in device embedded operating systems and firmware, and the private test report provides you with recommendations to improve the security of of these connected devices.
Meet the Expert Security Team
Agile Cybersecurity Solutions past and current relationships include the Central Intelligence Agency (CIA), Office of the Director of National Intelligence (ODNI), National Reconnaissance Office (NRO), National Security Agency (NSA), Defense Intelligence Agency (DIA), Department of Homeland Security (DHS), and a long list of the “who’s who” of commercial clients.
Bernard Charles (BC) Eydt, J.D.
virtual Chief Information Security Officer
Bio
Carlos Fernandes | CISSP
Founder & CEO
Bio
Juan Lopez | PMP, CISSP, CEH, CWAPT
Assessment Lead
Bio
Richard (Rick) Perri | CISSP, CEH, CySA+, CAP
Assessment Lead
Bio
Christopher (Chris) Perry | CISSP
virtual Chief Information Security Officer
Bio
Sushant Sen | CISSP, CEH
Assessment Lead
Bio
Jim Stange
Cyber Forensics Analyst
Bio
Nazar Tymoshyk | CEH, MSCP, CLE, DCTS, DCATS, NAI, NLTS, CNA, NCLA
Super SME
Bio
John P. Welby, E.J.D. | CCIE #3646 CCNP
Super SME
Bio
READY TO TAKE YOUR CYBERSECURITY TO THE NEXT LEVEL? DON’T WAIT FOR DISASTER TO STRIKE.