R2 Cybersecurity


3110 Magazine St. New Orleans, LA 70115

We can help you across the entire spectrum of your security and compliance needs

Whether you need someone to take a project from start to finish or just need a highly qualified resource for a specific assignment, we’ve got you covered. Our core focus is cyber security. We don’t “rack and stack” every IT service under the sun. Sure we know how to handle other IT-related services like building servers and phone systems, but your biggest return on your investment is when we focus solely on cyber security. Here is an overview of our most common offerings. If you are looking for something that doesn’t appear on the list, just ask. Chances are we’ve done it before.


Vulnerability scans identify security weaknesses in both your IT networks and IT systems to help you identify what needs to be fixed and where.

Network Penetration Tests are typically the next step after Vulnerability Scans and this is where we actively try to break into your network. The vulnerability scan finds the weak spots and the penetration test exploits them to show you where your network is weak and what can happen when someone breaks in.

Risk assessments are a more holistic approach to security in that they identify all security risks across your organization. They evaluate security by looking at risks not only from a technical perspective, but from an overall organizational perspective. In many industries, risk assessments are mandatory if you want to be in compliance.

System Security Plans are like a business plan for security. They are detailed documents that specify what an organization should be doing when it comes to all things related to security

Security Policies and Procedures are effectively a guideline and manual that can be referenced to address “how you do business securely.” They define the rules and processes that employees follow so your team knows what is expected of them, what rules they must follow, and how to follow them.

24x7 Security Operations Center provides you with a security command and control center where network security experts are monitoring the alerts and sensors on your network around the clock.
Security and Regulatory Compliance Consulting – We’ll help you understand what you need to do to meet the compliance regulations that your industry or customers require. We help you navigate your requirements; help you get into compliance and then help you stay there.
Contract Chief Information and Security Officer (CISO) – If you have the need for a senior leader who can bring years of experience and insight to the table, a Contract CISO can deliver what you need for roughly ¼ of what you’d need to invest in a full-time employee.


List of Services:

  • Penetration Testing
  • Compliance (HIPAA, PCI, FISMA, DIACAP, GLBA, ISO)
  • Mobile Device Security
  • Cloud Security
  • Policy & Procedures
  • Disaster Recovery
  • Web Application Scanning
  • Real Time Reporting
  • Vendor Management
  • Physical Security
  • Vulnerability Assessments
  • Data Loss Prevention
  • Audits
  • Firewalls
  • Intrusion Detection Systems (IDS)
  • Training
  • Network Assessments
  • Email Security
  • Remediation Recommendations
  • Security Information and Event Management (SIEM)
R2

© Copyright 2014 R2 Cybersecurity - Powered by DigiPro Media . All Rights Reserved.

R2