Tevora Datasheets

Filter By

Tabletop Exercises

Tevora guides your team through potential incidents such as phishing and ransomware to test your established IR procedures and responses and identify gaps in your IR plan and infrastructure.

Download
Program Creation

In the event of an incident, our IR “SWAT” team responds rapidly to locate the active threat(s), determine the incident scope and damage, isolate and contain affected systems and eradicate the threat from your environment.

Download
Emergency Incident Response Services

In the event of an incident, our IR “SWAT” team responds rapidly to locate the active threat(s), determine the incident scope and damage, isolate and contain affected systems and eradicate the threat from your environment.

Download
Virtual Security Operations Center VSOC

As new and maturing technologies such as IoT, artificial intelligence, mobile, and cloud redefine our perimeters, their endpoints also become potential points of entry for attackers.

Download
Cloud Compliance

Moving your workload to the cloud can offer significant benefits such as extended functionality, improved flexibility, and reduced costs.

Download
Critical Security Controls Assessment

Tevora’s Critical Security Control Assessment provides a point-in-time dashboard of the effectiveness and maturity of your organization’s security controls within the context of the NIST Cybersecurity Framework and COBIT 5 maturity model.

Download
Okta Security Solutions

Tevora’s team of engineers support you in implementing Okta’s identity and access management (IAM) platform, unlocking the platforms’ full potential in managing and protecting your network, system and device access.

Download
Social Engineering

One of the most common methods used to gain unauthorized access to corporate networks, social engineering accounted for 43 percent of the documented breaches in 2016.

Download
Internet Of Things (IoT) Penetration Testing

The Internet of Things (IoT) is a network of connected “things”
– computing devices that are embedded in everything from washing machines to automated manufacturing equipment.

Download