Making sophisticated cyber defense solutions with human supervision affordable to organizations worldwide.
To make a big impact worldwide in thwarting ransomware and other cyberattacks by making sophisticated cyber defense solutions with human supervision affordable to organizations worldwide.
Make the world safer from cyberattacks by focusing on outcomes, rather than tools and processes.
There is a litany of tools and approaches for action-oriented approaches to securing your business, but the elements of an outcome-oriented approach are simple. To detect attacks early and thwart breaches before they happen, at a minimum, the following elements need to be in place:
- A recognition by your executives of the grave threat posed by cybersecurity breaches.
- The institutional will and budget to put up a defense.
- Instrumentation of your organization’s unique network segments and key hosts to capture all activity.
- Automated intelligent procedures to detect off-pattern and nefarious activity early.
- A security operations center (SOC) staffed 24/7 by trained cybersecurity analysts who can monitor unusual activity for possible breaches and employ other proactive measures such as threat-hunting.
- An incident response team and plan that can rapidly implement counter-measures for any detected nefarious activity.
- Continuous ongoing vigilance and training within the organization aimed at preventing infiltration.
Gartner defines MDR as follows: The goal of MDR services is to rapidly identify and limit the impact of security incidents to customers. These services are focused on remote 24/7 threat monitoring, detection and targeted response activities. MDR providers may use a combination of host and network-layer technologies, as well as advanced analytics, threat intelligence, forensic data, and human expertise for investigation, threat hunting and response to detected threats.
With limited budgets and a scarcity of talent, setting up all the elements needed for MDR can be challenging for many organizations. However, what if you could get all the people, processes, and technologies needed at a modest cost on an outsourced basis that could be rapidly deployed into your organization?
That's where we come in.
INTUITUS recognizes the importance of online privacy and has created this Privacy Statement to describe the types of information we can (and cannot) collect at the INTUITUS website (also called the "Site") from visitors to this Site, and how we can use such information. Unless INTUITUS has entered into a written agreement with you that expressly replaces this Privacy Statement, this Privacy Statement describes the privacy policies that apply to you while you are using this Site.
Personally Identifiable Information and Aggregate Information
Personally identifiable information (or "personal information") is any information that can identify you personally or can be linked to you personally (i.e., name, address, credit card information). INTUITUS will use personal information only in the manner described in this Privacy Statement and will not share personal information with any third party unless you give us your prior consent for such use. "Aggregate information" is any information that cannot be linked to you personally (i.e., statistics regarding numbers and types of visitors). INTUITUS can freely use and share the aggregate information we collect from the Site for our business purposes. Nothing in this Privacy Statement will prevent INTUITUS from disclosing any of the above described information to the extent required by the need to comply with an applicable rule of law, a request of a government agency, or any other valid legal process (referred to collectively as a "Legal Process").
Persons who register at the Site by providing their email address and contact information to learn more about INTUIT services can rest assured that their information will only be used for the purposes of communicating product and sales information regarding INTUITUS products and will not be shared with any third parties for any other purposes.
Your computer generates a unique identifier (its IP Address) that is communicated to a Web site when you communicate with the Web site. We use your IP address to help diagnose problems with/administer our Site, and to provide technical support for your INTUITUS and Assessment Platform Account.
Partners and Other Sites
In order to protect the privacy of the personal information you supply us, INTUITUS and its network supplier implement industry standard security features including use of SSL encryption and Virtual PrivateNetworks, firewalls, back-ups, passwords, and audits. You acknowledge, however, that no security system is completely error free, hacker proof, or failsafe, and as such INTUITUS does not makeany warranties of privacy.
From time to time, we may inform you about products or services indirectly related to INTUITUS through our member bulletin. If you wish to opt out of these emails, you can do so by sending an email to firstname.lastname@example.org with the the subject "Unsubscribe". Please note, however, that as long as you are a customer of Intuitus Corp., you may not opt out of receiving standard administrative emails from INTUITUS.
Contacting the Site
If you have any questions about this Privacy Statement, the practices of this Site, or your dealings with this Site, you can contact: email@example.com
Our CEO is a decorated former fighter pilot. Our COO is a former Special Forces officer, so we can't tell you what he did. We are a formidable team of cybercrime fighters, many veterans, dedicated to making the world safer from cyberattacks. Ask us how we can help you protect your organization!
Leading Operations, Zach is a Special Forces “Green Beret” officer with 20+ years of leadership experience dealing with complex problems in challenging environments. Zach has experience as a Cyber Defense Analyst and has headed the Information Security program in a large government organization.
Leading Science and Engineering, Brian is a strategic and tactical IT Solutions Leader & Technology Consultant leveraging more than 25 years of success and expertise leading cross-functional teams. He is one of the leading voices for PSAP/911 cybersecurity and a frequent speaker at NENA conferences.
Leading Technology & Analytics, Jamie, who is sometimes called "the geek who speaks" is trained, certified, and experienced in network security, data-in-transit security, host-based forensics, and data recovery. He ably leads our team of cyberdefense analysts and works closely with the Boeing development team.
Leading Strategy & Development, Saro is a technology executive with a strong track record of innovation and strategic thinking. Previously, Saro was Founder-CTO of $100M financial services SaaS startup, Chief Architect of many Fidelity SaaS products including NetBenefits, and Engineering Leader of TSA PreCheck. Saro has published two books and holds several patents.
A seasoned combat pilot, jet fighter instructor, flight and industrial safety engineer, and a decorated senior USAF Officer, Dave previously served as Global MD of Business Intelligence and Security Consulting for Kroll Associates, Principal/Partner for Arthur Andersen, and Global MD for Aerospace & Defense and Business Intelligence.