Graybeard Security logo

Because
Experience
Matters

Stipooing the Bad Guys from Taking Your Stuff

We’re a boutique shop. Our team averages more than 30 years of hands-on experience, per person, in the world of Cybersecurity. We’re actual engineers that can operate on both sides of the table, intrusion and prevention, as needed.

We’ve been involved in local, regional and global scenarios for everything from a single location company to global, “Fortune 500” and governmental organizations.

We provide prevention, forensic investigation and remediation services as well as our own products for certain requirements.

Web Server Defense
Breach Remediation
Ultra-Secure Laptop
WEB SERVER DEFENSE

Security Handled

We are the only source in the world for XeroDefense, an industry-leading, fully-hosted, PHP Web Application Firewall. XeroDefense is “built from the ground up” to protect PHP-based web servers meaning it also protects WordPress, Drupal and Joomla sites.

Approximately 35% of all web traffic, possibly including your company’s, is handled by PHP with more than 75% of all web sites built in PHP to include Facebook, Wikipedia, Yahoo and Tesla to name just a small sample of the “big names” that use it.

Get Started

Web Application Firewall for PHP

Encrypts and protects the web server directory structure against an array of attack vectors. Load-balanced server deployments are supported.

Alerting and Reporting Engine

Alerts related to attacks as well as customer-set periodic, emailed reports are included. This function can integrate with other security tools such as a Security Information Event Manager (SIEM).

Real-Time Dashboard

A customizable dashboard that displays in real-time is included. This function can integrate with other security tools such as a Security Information Event Manager (SIEM).

Search Engine Optimization Toolkit

Many current attacks, even when unsuccessful, will have a negative impact on your site’s ranking so we include a full-featured SEO tool set to both monitor and improve your ranking.

Penetration Testing Toolkit

The best of intentions can leave a door open, so a full-featured PEN testing tool kit is included. This can be manually run or scheduled for specific intervals.

Continuous Backup/1-Click Restore

A continuous backup infrastructure with connectors for File, Block and Object storage is included. This is a file-level backup of all protected content designed to leverage your existing backup system.

Cyber Liability Policy

A $100,000 “no deductible, no qualifying necessary” Cyber Liability Policy to customers on our platform is included. This policy provides for up to $100,000 in coverage per incident and includes pay outs for remediation services.

BREACH REMEDIATION

Experience Matters

We’ve been providing cyber-attack remediation services since the virus “Satan’s Bug” showed up in 1993. We’ve learned that many companies seem inclined to take cybersecurity seriously only after they’ve been hit. That’s the expensive route.

Consider this: If standard, “off the shelf” applications and approaches worked, we wouldn’t exist and we’re pretty sure that we do. The reality is that some of the best in the world work for the bad guys. Some… but not all.

So far this year, Q3 2020, we’re seeing a 500% increase over last year in the volume of malware in the wild. How does that make you feel? Well, at least it keeps us busy…

We’re happy to get you back healthy, but we’d much rather stop the pain before it starts.

Get Started

Ounce of Prevention…

Coverage review

Don’t have a Cyber policy already? You’re a babe in the woods. Naked. You should fix that.

Penetration testing

Nearly every network has holes in it. Where are yours? What can an attacker gain access to? Are you sure?

Vulnerability scanning

Like PEN testing, but for software, what are your vulnerabilities? What is your exposure? Are you sure?

Architecture review

How does your environment stack up against current attack methods? What do you need to know?

Policy review

Are your policies and procedures current? Do you need some?

Pound of Cure…

Malware remediation

Among other things, we have experience reverse-engineering ransomware. Yes, you read that right.

Data recovery

Those non-responsive data stores may very well be recoverable. We have the experience to find out and recover what can be.

Contact tracing

We can find out who in the “dark web” is hunting you and your data and help you armor yourself.

Architecture redesign

Sometimes it only takes a little change to radically improve your security posture.

Employee training

Generally, the weakest link is ignorance. We can fix that.

ULTRA-SECURE LAPTOP

Usable Security

Security that produces an environment or device that lessens your productivity is not optimal. Is there a way to provide a highly-secure device that actually enables you? That’s the question we spent the last five years working on.

We have an answer. It is high-end laptop that runs a security-hardened operating system, comes with a full-featured Windows 10 and Office 2016 environment, and works like you need it to.

Our laptop protects you from being hacked and provides anonymous computing; you disappear on the Internet. Anonymity is important because nefarious things are being done to you and your data without your knowledge or consent.

We provide truly anonymous, secured computing that is balanced between secure and usable.

Get Started

Our Philosophy

We have no interest in trying to offer every possible security answer for every possible security problem. We choose to focus on a “subset of everything”, do it well, and offer it at a fair price to our customers.