Skip to content

Product Spec Sheets

Service Description Value Cost Structure
Application Security Scanning
Automated scanning with a cross section of security tools. Manual false-positive removal and reporting.
Identify production security vulnerabilities reducing time of exposure, multiple scanners deliver comprehensive coverage, expert false positive removal and mitigation recommendation.
Individual contracts or offered as a managed service for regular scanning as applications evolve over time e.g. daily or weekly scanning.
Application Penetration Test
Manual investigation and creative hacking to identify unique vulnerabilities.
Security experts with years of experience identify vulnerabilities that scanners miss but malicious actors may find.
Individual contracts or offered as a managed service for periodic testing as applications evolve over time e.g. quarterly or semiannually.
Static Code Analysis
Static code analysis (SCA) using various tools.
SCA assesses uncompiled source code to identify vulnerabilities early in the development cycle. SAST provides excellent mitigation advice and informs training programs.
Individual contracts or integrated into your development process for immediate, incremental scanning in agile environments.
Secure Development Training
In person or computer based security training.
Targeted security training provides the most proactive investment to mitigate vulnerabilities early in development.
Individual contracts or semi-annual refresher and targeted training, informed by complementary assessments.
Vulnerability Scanning: External
Automated scanning with a cross section of security tools. Manual false-positive removal and reporting.
Identify production security vulnerabilities reducing time of exposure, multiple scanners deliver comprehensive coverage, expert false positive removal and mitigation recommendation. Complementary to change control by identifying new devices within an IP range.
Individual contracts or offered as a managed service for regular scanning as applications evolve over time e.g. daily or weekly scanning.
Vulnerability Scanning: Internal
Automated scanning and manual false-positive removal and reporting. Unauthenticated or authenticated scanning to include patching across application e.g. Adobe, Java
Identify security vulnerabilities reducing time of exposure, expert false positive removal and mitigation recommendation. Complementary to change control by identifying new devices within an IP range
Individual contracts or offered as a managed service for regular scanning as environments evolve over time e.g. daily or weekly scanning.
IT General Controls Attestation
Interview and evidence review utilizing industry frameworks e.g. NIST CSF, ISO 2700/2.
Comprehensive view of security to align control maturity with business risk tolerance. Inform security investments and convey security to customers and partners.
Annual review with time and cost savings leveraging previous assessments.
Security Integrated Sales Process
Evaluate and improve sales process to ensure customer security requirements are understood and met
Reduce sales cycle and minimize disruption of the IT and development teams.
One time engagement, utilizing evidence of complementary security services to communicate with customers.
Risk Prioritization & Investment Roadmap
Interview based assessment incorporating control performance, Caliber experience, and business risk tolerance to develop security investment roadmaps.
Risk based security investments aligned with business drivers ensure the right amount of security at the right time to meet business needs.
Annual review with time and cost savings leveraging previous assessments.
Security Staff Augmentation
Complement and scale existing IT resources to execute security program activities e.g. perform internal audits, configure secure systems, author policy and standards, deliver monitoring and response services
Jump-start security services without hiring commitments and expense. Evaluate personnel for full time employment.
Quarterly engagements with optional contract to hire arrangements.