Enterprise Grade IT Security Services & Solutions

Intrinium SecurityIntrinium prides itself in hiring the brightest and most passionate technical security staff who bring a rare blend of energy and knowledge to any information security audit or assessment. While our consultants are relentless in identifying your organizational risks, they also take the time to understand your particular environment and unique business cases, ensuring that remediation strategies are both comprehensive and obtainable. This unique approach has allowed Intrinium to grow from a boutique consulting firm to a regional security leader in only a few short years. As information security professionals, Intrinium staff members have earned some of the most sought after security and technology-related certifications in the field. These include:

  • The Payment Card Industry Qualified Security Assessor (PCI QSA)
  • The Certified Information Systems Security Professional (CISSP)
  • The Certified Information Systems Auditor (CISA)
  • The Certified Ethical Hacker (C|EH)
  • The Certified in Risk and Information Systems Controls (CRISC)
  • The GIAC Security Essentials Certificate (GSEC)
  • The Offensive Security Certified Professional (OSCP)

Intrinium also has experience assessing the security of literally hundreds of networks in such organizations as government agencies, banks, credit unions, healthcare organizations, universities, and Fortune 500 companies around the United States and overseas. In addition, Intrinium prides itself in being an information security thought leader in the northwest and beyond. Intrinium security consultants have been featured speakers at conferences and industry gatherings in Spokane, Portland, Las Vegas, Chicago, Louisville, and beyond. Furthermore, our team members are bound by the codes of ethics of the PCI SSC, ISC2, and ISACA and are required to adhere to strict ethical standards. You can be assured that by choosing to work with Intrinium your information will be treated with the utmost discretion and confidentiality. Finally, Intrinium’s position as a thought leader has allowed us to form strategic alliances with critical security vendors such as FortiNet, Tenable, Aruba, Core Security, LogRhythm, McAfee, and Digital Guardian allowing us to bring you best of breed knowledge and remediation strategies.

Managed Security & Monitoring

Monitoring for security events 24×7 can be a daunting challenge, requiring deeply experienced staff and high operational costs. Intrinium’s Managed Security services reduce your operational expenses, improve response times to security events and provide a depth of experience and expertise that can only come from managing a wide range of customer environments worldwide.

Compliance & Audit

Ensuring high scores on regulatory compliance examinations and achieving compliance with regulations such as the GLBA, HIPAA, FERPA, SOX, and PCI guidelines can be difficult and time-consuming. Intrinium offers compliance gap analysis for a variety of regulatory standards.





PCI DSS Compliance

Achieving compliance with the PCI Data Security Standards (or PCI DSS 3.0) can be a complex and difficult process. Whether you need to complete a Self-Assessment Questionnaire (SAQ) or a full Report on Compliance (ROC), Intrinium’s Qualified Security Assessors (QSAs) have the skills and training to assist with achieving and certifying your compliance requirements.

Computer & Network Security

Assessing the security of your organization is paramount to being able to secure it. Intrinium offers a wide range of services with customizable scopes allowing you to test your entire IT infrastructure or just focused pieces using accepted methodologies and frameworks. Most security assessments include Penetration Testing, Vulnerability Assessment, and Social Engineering. Security Assessments may contain many modules including wireless security assessments, technology-specific assessments, web application testing, regular automated scanning, and more.

Incident Response & Forensic Analysis

In the last few years both the technology and legal resources have evolved to provide a way to prosecute the perpetrators of computer crime. Computer forensic evidence is required to successfully pursue and prosecute an attacker that has compromised a network.

Contact Intrinium Today

Drop us a line anytime, and one of our customer service reps will respond to you as soon as possible

Pin It on Pinterest