DCRI Client Video – Praetorian Secure
Praetorian Secure works with client from all industries including educational institutions and clinical health organizations such as DCRI…
The Michigan CyberSmart Program was created to help Michigan businesses with their Department of Defense (DoD) cybersecurity compliance. This program was also designed to help save our nation’s federal supply chain—and your business.
Praetorian Secure and The Michigan Defense Center (MDC/MEDC) are dedicated to supporting SMB’s throughout the State of Michigan by providing grant funding and cybersecurity services for NIST 800-171 and CMMC compliance up to the amount of $22,500. This grant was designed to address any deficiencies in IT infrastructure, and to help Michigan SMBs become fully compliant with DoD cybersecurity requirements.
Praetorian Secure is a qualified vendor and we are looking to assist local Michigan businesses with this fantastic initiative that is sponsored by the State of Michigan and as part, we are doing our best to put the word out to the masses and help offset compliance costs.
“Praetorian Secure was a knowledgeable and experienced component in our operation that provided expert services. Their professionalism and dedication to purpose in our critical solution was a necessary component in our overall success, a job well done. “
“They provided professional and dedicated services that demonstrated their expertise with the DIACAP process. A true pleasure to work with.”
“The skilled security professionals at Praetorian Secure were key members of the project team. Their insights and knowledge, around government security requirements, were essential ingredients to the success of the program.”
“I have worked with Praetorian Secure and would highly recommend this group of security professionals. My company engaged with Praetorian to enhance our systems security to meet the requirements of a large scale government contract. Praetorian brought a team of highly skilled and experienced professionals to our project and guided us to success.”
“Praetorian Secure has been instrumental in our efforts to achieve DIACAP accreditation. As a technology provider, we must undertake the task of ensuring our solutions meet the security requirements of the Department of Defense. With Praetorian’s expertise in this field, they have been a key partner in moving this process forward.”
“I have been working with Praetorian Secure since last spring and I have been very happy with them. They were agreeable to working within the constraints of our industry sector and to help develop a package of services that met our needs and fit our budget. Their staff is filled with experts who brought their…
“I had the opportunity to work with Praetorian Secure on a very large project for a Fortune 100 company. Praetorian demonstrated an array of expertise providing guidance in the areas of DIACAP, NIST, and PCI. Integrity was a constant in every engagement with Praetorian. I would highly recommend their services and personally look forward to…
Co-Founder of Praetorian Secure and CEO is our POC for anything compliance related. If your looking to talk about your compliance project Brent is your guy. He is very well verse across all verticals but he has been working in compliance for over +20 years and is no stranger to the rules and guidelines of NIST, CMMC, HIPAA, etc. If you have a question related to anything compliance or about an upcoming project, Brent can assist you.
Praetorian Secure works with client from all industries including educational institutions and clinical health organizations such as DCRI…
Need extra support with your cybersecurity objectives? Download Our Virtual CISO program overview to better understanding how we can help.
CMMC Made Easy Looking to learn more about CMMC?Learn how to be compliant with CMMC 2.0 in the quickest and easiest way possible. This is a made easy guide for government contractors and 3rd party sub-contractors. Please enable JavaScript in your browser to complete this form.Name *FirstLastCompany Name *Business Phone *Email *EmailConfirm EmailWebsiteDownload CMMC Made…
Learn how to handle your NIST compliance requirements with our complete PDF guide for NIST 800-171. Download the PDF today to get started.
CMMC Compliance PDF 2023 Looking to find out what services we offer?Download Our CMMC 2.0 Compliance PDF overview. This can help your team determine if our CMMC program offerings would be a good fit. Just fill in your info below to gain access to this exclusive content via a link sent directly to your email.…
Our HIPAA Compliance Service pdf provides insight on whether or not our compliance experts can help you solve your current requirements.
Download Our Pen Testing Service pdf to determine if your organization could benefit from deploying one or more of our pen testing services.
Download out HIPAA Compliance checklist to find out if your organization is up to par with the compliance requirements. If not we can help…
The US public school system is facing a growing cybersecurity crisis that is not going anywhere without a smart and efficient solution…
We helped DCRI secure their web application by pen testing to ensure no vulnerabilities were present when the app went to final production.
Protecting your SMB is no simple task. A small or medium sized business (SMB) needs to invest in IT to stay on top of a constantly changing work environment. However, securing this essential asset can be tricky. Fortunately, there are solutions out there to help make the task a little easier. Among these are companies…
Below are 8 best practices for CMMC compliance that our experts believe can give your organization a competitive advantage over other vendors in the defense industrial base and get you closer to reaching full CMMC compliance. 1. Identify CUI specific to the contract In addition to identifying CUI, you also need to determine its…
A Brighter Cybersecurity Horizon – Praetorian Secure
Cybersecurity Service Brief 2022 Looking to find out what services we offer?Download Our 2022 Cybersecurity Service Brief. It covers the general services we offer, markets we service, showcases some of the past customers we have done business with and more. Just fill in your info below to gain access to this exclusive content via a…
Multiple regulatory compliance requirements have made changes as of late that involve adding Penetration Testing to be performed on an organizations environment. With this added requirements comes added complexity…
In part 3 we cover general tools, services, architecture, and methods used to create a DevSecOps pipeline in AWS (Amazon Web Services).
In part two, we will discuss building a secure DevSecOps Pipeline using the Microsoft Azure DevOps family of products and services.
When building a DevSecOps Pipeline integrate security into the SDLC. improve development speed and security simultaneously…
Every testing tool and method used will have advantages and disadvantages including DAST, SAST, SCA, IAST and any other application security testing (AST) method. As your trusted experts, we will gather all the info we need and then provide a solution based on your organization’s SDLC needs.
Scripps Health falls victim to ransomware attack. They had to divert critical care patients. Remember to re-evaluate your cyber hygiene often…
The main objective of threat modeling is simple, prevent all threats from taking advantage of the system flaws in an application.
Protect your cyber assets from cybersecurity threats. We can help you define “what is” a critical assets and design a plan to protect them.
Data Privacy Day occurs every year on January 28. The purpose of Data Privacy Day is to raise awareness to data privacy and best practices…
National Cybersecurity Awareness Month (NSCAM) – Praetorian Secure Joins Far-Reaching Initiative to Promote Awareness of Online Safety & Privacy Praetorian Secure commits to be a Cyber Security Champion and to promote National Cybersecurity Awareness Month (NCSAM) on Oct. 1, 2019. Furthermore, NCSAM is held annually in October. Sign up as a Champion/Partner and join…
It can be inevitable at times to avoid using a public Wi-Fi network. One should abide by certain practices to protect themselves from…
Mobile security threats or otherwise known as hidden vulnerabilities are becoming increasingly popular among cyber actors…
Cyber Security Programs for SMBs are becoming extremely common since the recent surge in attacks show criminals are choosing SMBs as the new PRIME target…
Coming in at #8 on the OWASP Top 10 List – 2017, Most Critical Web Application Security Risks is Insecure Deserialization. This vulnerability occurs when untrusted data is used to abuse the logic of an application or application program interface (API).
Next, at #9 on the list, we have the use of components with known vulnerabilities. While this might sound easy to avoid, tight time constraints might cause developers to use whatever libraries it takes to get…
With the recent growth of web-based applications, it is more important than ever to keep security in mind when developing or maintaining these applications. The Open Web Application Security Project (OWASP) has a list of…
As most of us know, being responsible for cybersecurity and how it is perceived by an organization can be a rather thankless task. Very seldom is our job function(s) even noticed — unless of course our job was not done properly. With the onslaught of virtualization, mobile computing…
You cannot copy content of this page