services
Rift Symbol Square 150 px

Information
Security

Your critical assets are under scrutiny, and there are those that seek to separate you from your valuables. Unfortunately, compliance-based standards do not solve this problem.

Rift Recon will strengthen your defenses to reduce the risk a targeted actor will successfully compromise your business.

Rift Symbol Square 150 px

Physical
Security

Rift Recon can get in (and out of) anything! A comprehensive understanding of critical assets should include a review of real-world risks to those assets.

We employ top global experts in this field so you don't have to.

 

Rift Symbol Square 150 px

Advisory
Services

Looking to enter a new market, execute due diligence for a new product or investment, or simply gain a better understanding of your problem set?

We are the trusted advisor to financial institutions, ultra high net worth individuals, family offices, and the global Fortune 1000.  We can help.

Rift Symbol Square 150 px

Professional
Training

EMPLOYEE PHYSICAL SECURITY INTENSIVE

PHYSICAL BYPASS INTENSIVE

 

SERVICE PACKAGES

THE BASICS

Penetration Testing

Authorized simulated attack on a computer system displaying and testing for vulnerabilities physical or cyber.

Vulnerabilities Testing

Identifying cyber system vulnerabilities.

Gap Assessment

Assessment of current software for businesses systems and where coverage is lacking.

Business Impact Analysis

A review of business systems, assets, liabilities, contracts, 3rd party vendors and how it can affect your business.

IT System Overview

Creating adjustments to pre-existing IT system in order to integrate new digital systems.

 

Financial Planning For Security Services:  is available to build security all while the company continues to grow.

FOR START UP

Gap Assessment

Assessment of current software for businesses systems and where coverage is lacking.

Physical Security overview

Review of proposals and selection for facility physical security. Internal, external and peripheral security analysis.

Custodian Program

Cryptocurrency program to reduce risk of companies assets

Business Impact Analysis

A review of business systems, assets, liabilities, contracts, 3rd party vendors and how it can affect your business.

Digital Security Overview

Analysis of current cybersecurity architecture.

(Optional) CSO consulting

-Building preliminary steps

-Creating and engaging early security solutions

-Risk Management

 

Financial Planning For Security Services:  is available to build security all while the company continues to grow.

IT OVERHAUL

IT System Overview

Review of current IT infrastructure.

IT infoSec Strategy for compliance regulations

IT strategy development for entities compliance regulations.

Analysis of current cybersecurity architecture.

External IT Audit

Data Mapping/Data Classification:

Classifying assets and business sensitivity.

Securithis Deployment:

Protocol optimizing business security solutions after an analysis of the vulnerabilities

 

Financial Planning For Security Services:  is available to build security all while the company continues to grow.

PTO “Prior to Initial Offering”

Penatration Testing

Authorized simulated attack on a computer system displaying and testing for vulnerabilities physical or cyber.

Business Impact Analysis

A review of business systems, assets, liabilities, contracts, 3rd party vendors and how it can affect your business.

Digital Security Architecture Overview

Analysis of current cybersecurity architecture.

Securithis Deployment

Protocol optimizing business security solutions after an analysis of the digital vulnerabilities. Cyber Programs integrated to current business systems retrofitted to Gap Assessment and Business analysis results allowing for optimized threat mitigation. Securithis can be monitored in order to review and assess risk threats.

Physical to  Digital Security Integration

Review of proposals and selection for facility physical security. Internal, external and peripheral security analysis.

Custodian Program

Cryptocurrency program to reduce risk of companies assets.

Incident Response Plan

Development of planning and procedures oriented around different threats physical and cyber.

 

Financial Planning For Security Services:  is available to build security all while the company continues to grow.

FULL DEPOLYMENT

Gap Assessment:

Assessment of current software for businesses systems and where coverage is lacking.

Business Impact Analysis

A review of business systems, assets, liabilities, contracts, 3rd party vendors and how it can affect your business.

Physical Security Assessment

Review of proposals and selection for facility physical security. Internal, external and peripheral security analysis.

Preceptor Deployment

Protocol optimizing physical security and initiating resource deployment.

Securithis Deployment

Protocol optimizing business security solutions after an analysis of the digital vulnerabilities. Cyber Programs integrated to current business systems retrofitted to Gap Assessment and Business analysis results allowing for optimized threat mitigation. Securithis can be monitored in order to review and assess risk threats.

Physical to Digital Security integration

Review of proposals and selection for facility physical security. Internal, external and peripheral security analysis.

 

Financial Planning For Security Services:  is available to build security all while the company continues to grow.

FOR THE ICO

Blockchain Audit

Analysis of financial stability and chain structure.

Business Impact Analysis

A review of business systems, assets, liabilities, contracts, 3rd party vendors and how it can affect your business.

Gap Assessment

Assessment of current software for businesses systems and where coverage is lacking.

Physical Security Assessment

Review of proposals and selection for facility physical security. Internal, external and peripheral security analysis.

Securithis Deployment

Protocol optimizing business security solutions after an analysis of the digital vulnerabilities. Cyber Programs integrated to current business systems retrofitted to Gap Assessment and Business analysis results allowing for optimized threat mitigation. Securithis implements 24/7 breach detection monitoring that will navigate threats in order for you to focus on your business.

Custodianship Program

Cryptocurrency program to reduce risk of companies assets.

Mitigates risk of company failure in passing of executive.

 

Financial Planning For Security Services:  is available to build security all while the company continues to grow.

RR Logo White

[email protected]

SAN FRANCISCO, CA, 94114

Copyright © 2018. Rift Recon Security LLC. All Rights Reserved