CyberPoint Services

We protect what's invaluable with a broad range of cyber security services and solutions.

Some of the Ways We Protect What's Invaluable

There are no silver bullets in cyber security. That's why we offer a broad range of services, solutions and products. Our experts help customers recognize, recover from, and understand attacks. We engineer resilient networks. And our analytics and expertise prepare customers for a future of continuously emerging threats.

CyberPoint Services
Malware Analysis and Reverse Engineering

Malware Analysis and Reverse Engineering

CyberPoint's expertise in malware analysis and reverse engineering supports our research, incident response, and product development. With extensive experience in reverse engineering and malicious code analysis, our experts provide analysis of assembly language from all major platforms. They have a deep practical and theoretical understanding of tools and tradecraft from across the industry. We are the creators of DarkPoint, an industry-leading advanced malicious digital artifact identification and analysis product.

Digital Forensics and Incident Response

CyberPoint's experienced global response teams are on-call to address serious cyber attacks, intrusions, and insider-threat incidents. We have extensive experience assisting legal and law enforcement teams with complex cases, and we've responded to numerous high-profile corporate cases of computer crime. As always, our teams are backed by CyberPoint's advanced reverse engineering, malware analysis, and network exploitation expertise.

Digital Forensics and Incident Response
Secure Network Engineering

Secure Network Engineering

Every enterprise has its distinctive needs, and CyberPoint tailors its services to meet them. Our engineers design in network security from the beginning, and our security experts use a risk assessment and threat monitoring methodology that includes novel threat monitoring tools to ensure the security of your networks—today and tomorrow. We protect the right assets, from the right threats, with the right measures.

We begin by analyzing what you do with your network today, including how it fits with your business practices and objectives. From there, we propose (and deliver) either re-architecting, complete re-design, or design of tailored additions to your infrastructure. Our work extends to endpoints, switches, Internet access, communications, and security.

CyberPoint approaches cyber security through the Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines. These were developed under the leadership of the SANS Institute with the consensus of more than one hundred IT security specialists from the US Government, the private sector, and various international partners. Organized in priorities established by the US National Security Agency, the Twenty Controls have rapidly become the international standard for cyber security audits.

Risk Analysis and Vulnerability Assessment

CyberPoint's risk analysis and vulnerability assessment represents a best-practice step toward an improved security posture. We help our customers assess their current practices and prioritize remediation and mitigation strategies to further improve its cyber security. Our engagements typically consist of three phases:

  • Recon. We identify probable targets of exploits. Our comprehensive identification program goes well beyond traditional vulnerability assessments by incorporating social engineering analysis (public employee information, e-mail phishing, etc.), data mining (from LinkedIn, Facebook, and other sources) and remote network analysis (public servers, domain names, etc.).
  • Inspect. After identifying possible threats, we analyze each target for relevant vulnerabilities. We examine your organization through the eyes of a malicious user, and run both remote and internal assaults. Our inspection includes—with your consultation and agreement—an active attempt to exercise the vulnerabilities we've detected.
  • Assess. We document the vulnerabilities, suspicious activities, and potential security problems we found. We also include recommendations for securing your enterprise.

CyberPoint has also pioneered an innovative method for quantifying cyber value-at-risk, an essential element of rigorous risk management. Our holistic approach ensures a prudent, deliberate, cost-effective approach, with the flexibility to adjust as conditions and priorities demand.

Risk Analysis and Vulnerability Assessment
Machine Learning Research

Machine Learning Research

CyberPoint is a leader in machine learning research and development: the study and construction of systems that can "learn" from data, emulating generalization from a set of cases to new, relevantly similar cases.

One goal of our machine learning research is development of artificially intelligent systems that simulate the decision-making of a human expert. Our flexible, multidisciplinary team of experts has delivered advanced and innovative tools like DarkPoint and Resonance, a predictive analytic sensor, both of which have transitioned deep research into machine learning and expert systems from the laboratory to operational networks. DarkPoint automates malware analysis, and Resonance automates malware detection.

We perform cutting-edge research in cyber security, develop new intellectual property (including advanced product prototypes using new technologies), and invent new tools for our customers. In this we collaborate with research universities, (our principal university research partner is the University of Maryland). CyberPoint's research in software and hardware security uses methods and techniques drawn from computer science, cryptography, electrical engineering mathematics, and the life sciences. We integrate these with extensive real-world experience in security analysis and reverse engineering. Research is integral to our offerings.

Learn more in the CyberPoint Labs section.

High Performance Computing and Big Data

We're well equipped to deliver the solutions you need to tackle the challenges of high performance computing and big data. In particular, we enable big data manipulation and high-performance computing in ways enable us to analyze customers' data while simultaneously protecting it.

We design and implement large cluster systems, and have deep experience working with novel architectures and large-scale scientific applications. We're proficient with ultranet programming models, and we're experts in algorithm development and application to large problems.

Our expertise in all major operating systems and programming environments includes Hadoop, and Accumulo. It extends to other distributed programming platforms. Among the breakthroughs we've made are machine-learning tools for categorization of data clustering, application of high-performance computing and big data to cyber defense, and data segregation and privilege management for data clouds.

Because high-performance computing and big data problems often require a diversity of skill sets, the CyberPoint team includes multidisciplinary expertise and backgrounds: from computer scientists and electrical engineers to mathematicians, life scientists, logicians, creative artists, physicists, linguists, and graphic designers. These broad and deep capabilities yield creative, innovative, highly integrated solutions to complex problems.

High Performance Computing and Big Data
Strategic Planning and Policy Development

Strategic Planning and Policy Development

CyberPoint understands the interplay of technology with policy and operations. We help identify and implement IT strategies and processes that ensure an organization's ability to maintain security and continuity of operations in the face of attacks and other unexpected events.

CyberPoint engineers will help your organization reduce your exposure, develop IT business continuity plans and make testing such plans a normal aspect of your IT operations. Our experienced operators and policy experts know how to take the engineers' work and put it into a comprehensive system that supports any organization's business or mission.

Foreign Technology Evaluation, FOCI Mitigation

The US government and private sector are always looking for new and innovative products to meet their needs, but often find themselves unable to take advantage of the global marketplace due to uncertainties over foreign owned products and technologies. A globalized supply chain is also a worry, especially with IT systems that undergo production, patching, and updating throughout their lifecycle.

We help foreign-owned companies build trust with potential customers and enhance their products in order to open up new markets in the United States. We provide both foreign and domestic commercial technology companies one of the fastest, most comprehensive and inexpensive ways into the US Federal and commercial marketplace. We also mitigate the supply chain risks to buyers through security applied at the most cost-effective points of the product lifecycle.

  • We assess products for security, market viability, and issues related to foreign ownership, control, and interest (FOCI). Based on the results of the assessment, we then work with companies to determine the best path into the US markets.
  • We do white box, gray box, and black box testing on foreign technology. Our experienced research team evaluates each product to identify potential vulnerabilities, and then designs solutions tailored to mitigate any problems.
  • We can deliver security reports and market analysis, but we can also open new sales channels, work with companies to create derivative products, and even draw on an investment fund to get innovative ideas off the ground.

When both the marketplace and the supply chain are irreversibly international, CyberPoint helps you enjoy the benefits of globalization as we mitigate its risks.

Prescient: Foreign Technology Evaluation, FOCI Mitigation
Mobile Security

Mobile Security

CyberPoint delivers comprehensive solutions for secure mobile operations: we secure devices, communications, and data. Our approach encompasses active and passive measures designed to prevent unauthorized access to your equipment and information. We also design in protection against compromise or exploitation through espionage, sabotage, terrorism, and other criminal activity.

We provide technology integration of middleware (switches, routers, virtual private networks, etc.), endpoint protection, and user training.

We've created comprehensive mobile communications secure infrastructures, from servers through networks and out to devices. We secure endpoints, with encryption and remote wiping to protect users from the consequences of losing devices. We securely bring productivity software to devices, enabling implementation of sound BYOD policies.

We have particular expertise in Android and iOS forensics, across multiple platforms. And we bring our industry-leading security tool DarkPoint to our customers' mobile applications.