Over the last 10 years Pivot Point Security has been fortunate enough to work with hundreds of clients ranging from 2 person currency trading start-up’s through the world’s largest telecommunication, hospitality, and financial services firms. A “sampling” of the industries we have worked more heavily in and representative clients are provided to help you determine if we are the right company to help you. We look forward to hearing from you…
Hackers are shifting their focus from individual corporations to data consolidation points like large law firms because breaching a single network may allow them to obtain information about hundreds or thousands of companies by breaching a single network.
In response to this greater risk law firms are increasingly moving to more comprehensive Information Security Programs (e.g. Security Awareness Training, Vendor Risk Management, Vulnerability/Configuration Management, Incident Response Programs, and Information Technology/Business Continuity). Market leading legal firms are leveraging ISO 27001 to manage risk holistically and provide attestation (proof) of their Information Security Program.
View representative Legal Industry clients
In the ever-changing world of technology, information security requirements change almost daily. Staying one step ahead of the newest threats means constantly monitoring your security posture. We help our technology clients meet and exceed their security requirements.
Addressing the unique challenges of third party information security requires an equally unique and flexible approach. Without question the single most challenging issued for business process outsourcers is third party attestation.
View representative Technology Industry clients
Information Security is essential to the broad utilization of, and confidence in, Electronic Health Records (EHR) and realizing their promise of quality improvement and cost containment. However, Healthcare Information Security is relatively unique.
View representative Healthcare Industry clients
Our government customers have unique requirements. Often services range from standard security assessment testing to application-specific analysis. Experienced with local townships and mega-city structures, we know government entities and the myriad of issues that affect their functions.
eGovernment holds the promise of seamless sharing of electronic information between agencies and private business and provided online access to a variety of constituents. However, ensuring access to authorized users and protecting sensitive government and personal data while meeting compliance demands, has its unique challenges.
View representative Government Industry clients
- Financial Services & Banks
Our financial customers range from small, community banks to large financial services organizations. Whether a yearly, FDIC-required penetration test or full-scale network architecture review, we understand the requirements of financial institutions.
View representative Financial Industry clients
- Utilities & Energy
Protecting the integrity of the grid is exceptionally challenging in that it requires a holistic approach to ensuring the security of the processes that act on the information and the assets (e.g., servers, networks, applications, personnel, facilities) that support these processes.
View representative Utilities & Energy Industry clients
- More Industries
Global fortune 1000 – In the ever-changing world of technology, information security requirements change almost daily. Staying one step ahead of the newest threats means constantly monitoring your security posture. We help our technology clients meet and exceed their security requirements.
Thank You. We appreciate the fine work and opportunity to work with Pivot Point Security as a partner in improving our environment.–Information Security Assurance
Your consultant has been fantastic and we absolutely could not have done it without him. He is extremely knowledgeable and represents your company very well.–ISO 27001 client – upon achieving certification
The way you walked us through and took time to explain what the reports mean, what the data means, and we don't have to know the technical details behind it. The exit meeting was really good for us "non-technical" people. You speak straightforwardly and make it understandable - better than any testing we've ever had.–Annual Network Penetration Test
The experience was excellent, everything was understood perfectly, reporting excellent and as usual very trustworthy.–Application Penetration Test
I was very pleased with the scope and I appreciate your analysis and how you handled everything; I will definitely continue to use you! –Internal Network Penetration Test
Very easy to work with - you walked us through step by step; very happy with the reports –External Network Penetration Test
Your technical resource was great on site; easy to work with, and he explained everything very simply. He made the experience a pleasure. –Database Vulnerability Assessment
Pivot Point was professional in every way and your consultant’s help and follow through is what enabled us to be so prepared for our audit and achieve ISO 27001 certification…–Satisfied ISO 27001 certification client
Very professional – and worked with integrity. You made it easy for someone who had no idea what she was doing!–WLAN Survey
Tech resource was great - very respectful on site - very careful with our systems; overall the experience was great. I felt the whole "process" worked really well–Network Penetration Test
Everything went smoothly. We're very happy with the results and the internal auditors were happy with the process and feel that the Pivot Point Security process met their criteria. Great experience - we look forward to working with you next year!–Network Vulnerability Assessment & Penetration Test
The technician was great - he just came in and did the job, with no issues. He was very up front with the what and how - gave good explanations.–Vulnerability Assessment & Penetration Test
The certification process went very smoothly. Knowing now what’s involved, we could not have done it without your help!–ISO 27001 client – Legal