Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.
Incident & Breach Response
Incident response is the rapid reaction team used to manage the consequences of a breach. The main objective of an incident response is to minimize the impact of a security compromise and allow a rapid recovery of the systems, guaranteeing business continuity, as well as investigate the root cause of the breach and improve the security posture of the systems in order to reduce the risk of successful incidents in the future.
Mobile Security
Penetration test of mobile apps involve simulating the actions of a skilled attacker to identify vulnerabilities both in the application's supporting infrastructure (backend APIs and databases), in the communication between the app and the server, and an analysis of the application per se, along with its interaction with the device.
Penetration Testing
The main objective of this service is to be ahead of the game of a malicious insider, such as a disgruntled employee, that may have basic access to the network. This service can also be used to evaluate and validate the organization’s defenses against a scenario of a motivated and persistent external attacker with no privileged access or knowledge about the network infrastructure.
Threat Intelligence
In the threat intelligence service offered by Blaze Information Security, the gathering of information is achieved predominantly through automated fashion, using home made tools and scripts, with outputs validated by our intelligence analysts. The collected data is posteriorly correlated and interpreted in order to imbue it with business and technical context so it can become useful to the decision making process of our customer.
Vulnerability Management
The analysis takes place in a daily basis, where our consultants perform security tests against the systems under scope. When a vulnerability is identified, the client's IT team is immediately notified through the dashboard of our in-house developed VMS (Vulnerability Management System)