top of page
Welcome to
Moore & Company
Enterprise Information Security Consulting​​
​
​

Your Security Is Our Business™
Because You Deserve Moore ™
We utilize processes and methodologies developed and endorsed by the Information Systems Audit & Control Association, National Institute of Standards & Technology, Committee on National Security Systems, Cloud Security Alliance, OWASP, and CompTIA, to deliver you, our valued client, class-leading information security services.
Risk Assessment [Comprehensive]
A comprehensive risk assessment of your organization's information assets. Includes: Network vulnerability assessment, physical security assessment, social engineering analysis, business continuity planning (including business impact assessment) and disaster recovery planning.
Risk Assessment [A La Carte]
Bespoke risk assessments, carefully tailored to your business case.
​
You have idintified initial security requirements and need a partner to help you refine and execute on those requirements. Example: Your business recently moved data center operations into a new facility, and needs a physical security assessment. Or you have experienced a web-security breach, and need to design and implement new application security controls such as a new identity and access management scheme or input validation via regular expressions. Or maybe you are launching a new, mission-critical software application next quarter, and need an exhaustive network vulnerability assessment you can incorporate into your secure software development lifecycle (SDLC) roadmap. First, you might need a secure SDLC methodology. With our deep, broad expertise, we will help ensure you are poised, prepared and confident, to lead a secure and sustainably competitive future. Moore security means less risk, more certainty, and a trusted partner in securing your business and your future.
Compliance & Audit
The need to comply with regulations and laws effects many businesses, across many economic sectors. Our team is dedicated to ensuring your business is prepared to effectively and sustainably comply with applicable information and information technology regulations and laws, within the context of ever-evolving market, political and legal conditions.
Laws & Regulations
We are ready to advise you on the following, and more:
-
HIPAA
-
NIST 800-53
-
Secure SDLC
Toolbox
We utilize proven, leading edge technologies and tools to asssess and secure your information assets, including, but not limited to:​
​​​
-
Nmap
-
Nessus
-
SNORT
-
WireShark
-
Metasploit Framework
-
HIPAA Risk Assessment Tool​​
​
Coming soon:
​
- Splunk [SIEM Tool]
- OpenVAS [Vulnerability Scanner]
- Infrascale [Disaster Recovery & Data Protection as a Service]
-
Retina CS [World’s First Context-Aware Vulnerability Assessment & Risk Analysis Solution]
Advisory Services
-
Data Security
-
Disaster Recovery Planning
-
Business Continuity Planning
-
Information Security Strategy
-
Secure Software Development
-
Identity & Access Management
-
Secure Application & System Design
-
Intrusion Detection & Prevention Systems​
Process & Framework
Let us help secure your future, by ensuring confidentiality, integrity and availability.
We utilize several essential processes and frameworks, proprietary and external, to deliver you Moore value. They include, but are not limited to:
​
-
NIST 800 Series Guidance
-
Security in Depth
-
Secure SDLC
-
Zero Trust
-
CIA Triad
-
RBAC
Contact Us
Las Vegas, NV
USA
We reserve meeting space on-demand or meet with you on-site.
Please let us know if you would prefer a remote engagement.
702-344-0222

bottom of page