Core Insights, Inc
Services Line Card
Updated: April 2024
1. Gap Analysis / Program Assessments and Risk Assessments
Based on the following best practice, frameworks and compliance standards:
CCPA
CDPA
CIS
CMMC
COBIT
COPPA
CPA
CPRA
DFARS
FedRAMP
FERPA
FFIEC
FTC
FISMA
GDPR
GLBA
HIPAA
HITRUST
ISO
ITAR
NIST
NYDFS
OFAC
PCI-DSS
PIA
PIPL
SOC
2. vCIO
3. vCISO
4. vCOO
5. AI Planning, LLM, Use Case Dev, Governance
6. IT Roadmap
7. Security Roadmap
8. Risk Register
9. Strategy Planning
Applies to:
Hospital Operations
IT Operations
Security Operations
Transformation
Automation Adoption
Logistics and Supply Chain
Warehouse Operations
M&A
Cultural Due Diligence
IT and Operations Due Diligence
Software / Product Validation and Due Diligence
Skills Assessments and Team Alignment / Consolidation Planning
Business Process Optimization
10. Software Rationalization
11. PSP Development (policy, standards and procedures)
12. Governance Programs (customizable)
13. Custom Playbooks
14. Business Impact Analysis
15. Disaster Recovery Planning
16. Incident Response Planning
17. Business Continuity Planning
18. Data Protection and Lifecycle Management
19. Vendor Risk Management / TPRM
20. Technology Implementations, Engineering, Integrations, Upgrades and Migrations Various solutions for each line item below:
Ansible
Apache JMeter
AppLoader
Arista
Aruba
AV
Beyond Trust
CASB
Cisco
CloudFlare
CyberArk
Cyber AI
Data Lake
DataDog
DevOps
DLP
EDR
Elastic
ESentire
ETL Tools
Exabeam
File Integrity Monitor
Forensic security Tools
Fortinet
IAM
Insight IDR
InsightAppSec
InsightCloudSec
InsightVM
Juniper
Kubernetes
LoadNinja
LoadRunner
LogRythm
Manage Engine
MarsSuite
MDR
Meraki
Metasploit
MFA
MS SQL
MySQL
Nexpose
NinjaOne
O365
Oracle
Palo Alto
PAM
Qualys
Rapid 7
RedCanary
SASE
Security Scorecard
Sentinel One
SIEM
SOAR
Sophos
Splunk SIEM
SSO
Sumo Logic
Terraform
Threat Command
Ubiquity
Vulnerability Management
Wireless Network, automation and self-healing systems
XDR
XiiD
Zero Trust (ZTA)
ZScaler
21. IT Services
AIDC (automatic identification and data collection) hardware agnostic
Hardware Rack and Stack
Data Center Implementations and Migrations / Moves
Physical to Virtual
Virtual to Virtual (migrations or upgrades)
Low Voltage Cabling and Cable Management
Managed Services
NOC
SOC
Managed IT Help-desk
Managed Firewalls and Routers
Managed Patch Management
22. Secure Access, Card, Strikes, Facial Recognition, Bio Metrics
23. Supply Chain Visibility
24. Warehouse Automation / Robotics
25. RFID
26. Forensics
Investigations
Expert Witness
DFIR
Threat Hunting (as a project or managed services)
27. CCI - Cyber Counterintelligence
Threat Hunting for new vectors and early detection of zero-day
Identification of bad actors
Geo-location for physical assets
Tracing bad actors before they act
Partner with DoD, NSA, CIA, DIA for information sharing and reporting
HumanINT, SigINT, CyberINT, OSINT
Collection CCI
Defensive CCI
Offensive CCI Planning for United States government agencies
​
Core Insights PMC Services Consulting (private military contractor)
​
1. Executive Protection
2. Drone Security and Drone Mitigation
3. Asset Tracking and Location
4. Personnel Recovery
5. Electronic Countermeasures
6. Physical Security Solutions
7. Armored Vehicle Escorts
8. CQB Training
9. Firearms Training
​
Contact us for more details so we can discuss your specific needs.
​