Technical Services - Detect and Protect

 

Technical Services

tw-Security provides in-depth technical services through its partnership with Talus Solutions.

Combining Strengths

A friendship over 20 years was the catalyst for the strategic alliance that brings together Talus Solutions and tw-Security.

Both firms have created and provided multiple integrated strategic and tactical solutions to support our customers’ information security, cybersecurity, and data privacy programs.

We now combine these best-in-class solutions to provide clients with a comprehensive solution for risk analysis that is supported with technical validation of controls, ransomware readiness assessments, and incident response (IR) playbooks, plus technical and leadership IR tabletop exercises.

The result is an enhanced suite of cybersecurity service offerings that leverages both our strengths.

Together, we’re meeting the ever-growing challenge of keeping your organization and patients safe and secure.

 

About Talus

The Talus team delivers “tailored and scaled” services to healthcare organizations that range from very large academic medical centers and standalone, community-based hospitals to diverse business associates.

Talus draws on experience from a wide variety of industries—including global finance, oil and gas, manufacturing, and technology—to leverage best practices and apply them to healthcare solutions.

Talus consultants average five industry-relevant certifications, including::

  • Certified Ethical Hacker (CEH)
  • An Online Certificate Status Protocol (OCSP), used by Certificate Authorities to check the revocation status of an X.509 digital certificate
  • Multiple SANS cybersecurity certifications, addressing offensive testing, defensive architecture and monitoring, forensics and incident response, cloud security, and leadership

Talus has regional group purchasing organization (GPO) contracts with Mid-America Service Solutions (MSS) and Children’s Hospital Association (CHA) to complement their national contract with Vizient. Members of these organizations can access our combined solutions through these contract vehicles.

 

Technical Service Offerings

  • Threat management services including vulnerability scans, external, internal and application penetration testing, and social engineering exercises.
  • Cloud security assessments and consulting
  • Identity governance and administration (IGA and IAM) consulting
  • Incident response services
  • Medical and IOT device security assessments and solutions
  • Public key infrastructure (PKI) assessments, design, and implementation
  • Biomedical device inventory, discovery, and vulnerability enumeration
  • Data-driven, brand- and product-neutral security solution selection process
  • Enterprise security/architecture security design, implementation, and support

Managed Services

  • Hybrid SOCaaS and SIEMaaS solutions
  • IGA and IAM managed services
  • Security infrastructure monitoring
  • Fractional security engineers and architects

 

For more information about these services and how they may benefit your operations, please contact us.