top of page

Core Insights, Inc

Services Line Card

 

Updated: April 2024

1.   Gap Analysis / Program Assessments and Risk Assessments

Based on the following best practice, frameworks and compliance standards:

CCPA

CDPA

CIS

CMMC

COBIT

COPPA

CPA

CPRA

DFARS

FedRAMP

FERPA

FFIEC

FTC

FISMA

GDPR

GLBA

HIPAA

HITRUST

ISO

ITAR

NIST

NYDFS

OFAC

PCI-DSS

PIA

PIPL

SOC

2.   vCIO

3.   vCISO

4.   vCOO

5.   AI Planning, LLM, Use Case Dev, Governance

6.   IT Roadmap

7.   Security Roadmap

8.   Risk Register

9.   Strategy Planning 

Applies to:

Hospital Operations

IT Operations

Security Operations

Transformation

Automation Adoption 

Logistics and Supply Chain

Warehouse Operations

M&A 

     Cultural Due Diligence

     IT and Operations Due Diligence

     Software / Product Validation and Due Diligence

     Skills Assessments and Team Alignment / Consolidation Planning

Business Process Optimization

10.  Software Rationalization 

11.  PSP Development (policy, standards and procedures)

12.  Governance Programs (customizable) 

13.  Custom Playbooks

14.  Business Impact Analysis

15.  Disaster Recovery Planning 

16.  Incident Response Planning

17.  Business Continuity Planning 

18.  Data Protection and Lifecycle Management 

19.  Vendor Risk Management / TPRM

20.  Technology Implementations, Engineering, Integrations, Upgrades and Migrations Various solutions for each line item below:

       Ansible

       Apache JMeter

       AppLoader

       Arista 

       Aruba 

       AV 

       Beyond Trust

       CASB 

       Cisco 

       CloudFlare 

       CyberArk

       Cyber AI 

       Data Lake 

       DataDog

       DevOps

       DLP 

       EDR 

       Elastic

       ESentire

       ETL Tools 

       Exabeam

       File Integrity Monitor

       Forensic security Tools 

       Fortinet 

       IAM 

       Insight IDR

       InsightAppSec

       InsightCloudSec

       InsightVM

       Juniper

       Kubernetes

       LoadNinja

       LoadRunner

       LogRythm

       Manage Engine

       MarsSuite

       MDR 

       Meraki 

       Metasploit

       MFA 

       MS SQL 

       MySQL 

       Nexpose

       NinjaOne

       O365

       Oracle 

       Palo Alto 

       PAM 

       Qualys 

       Rapid 7 

       RedCanary

       SASE 

       Security Scorecard

       Sentinel One 

       SIEM 

       SOAR 

       Sophos 

       Splunk SIEM

       SSO 

       Sumo Logic

       Terraform

       Threat Command

       Ubiquity 

       Vulnerability Management 

       Wireless Network, automation and self-healing systems 

       XDR 

       XiiD

       Zero Trust (ZTA) 

       ZScaler 

21.  IT Services

AIDC (automatic identification and data collection) hardware agnostic

Hardware Rack and Stack

Data Center Implementations and Migrations / Moves

Physical to Virtual

Virtual to Virtual (migrations or upgrades)

Low Voltage Cabling and Cable Management

Managed Services 

    NOC

    SOC

    Managed IT Help-desk

    Managed Firewalls and Routers

    Managed Patch Management

22.  Secure Access, Card, Strikes, Facial Recognition, Bio Metrics

23.  Supply Chain Visibility

24.  Warehouse Automation / Robotics 

25.  RFID

26.  Forensics 

Investigations

Expert Witness

DFIR

Threat Hunting (as a project or managed services)

27.  CCI - Cyber Counterintelligence 

Threat Hunting for new vectors and early detection of zero-day

Identification of bad actors

Geo-location for physical assets 

Tracing bad actors before they act

Partner with DoD, NSA, CIA, DIA for information sharing and reporting

HumanINT, SigINT, CyberINT, OSINT

Collection CCI

Defensive CCI

Offensive CCI Planning for United States government agencies

​

 

Core Insights PMC Services Consulting (private military contractor)

​

1.  Executive Protection

2.  Drone Security and Drone Mitigation

3.  Asset Tracking and Location

4.  Personnel Recovery

5.  Electronic Countermeasures

6.  Physical Security Solutions

7.  Armored Vehicle Escorts

8.  CQB Training

9.  Firearms Training

​

Contact us for more details so we can discuss your specific needs.

​

bottom of page