Core Insights, Inc
Services Line Card
Updated: April 2024
1. Gap Analysis / Program Assessments and Risk Assessments
Based on the following best practice, frameworks and compliance standards:
CCPA
CDPA
CIS
CMMC
COBIT
COPPA
CPA
CPRA
DFARS
FERC
FEDRamp
FERPA
FFIEC
FISMA
FTC
GDPR
GLBA
HIPAA
HITRUST
ISO
ITAR
NIST
NYDFS
OFAC
PCI-DSS
PIA
PIPL
SOC
TISAX
2. vCIO / vCTO
3. vCISO
4. vCOO
5. AI Planning, LLM, Use Case Dev, Governance and Security Controls
6. IT Roadmap
7. Security Roadmap
8. Risk Register
9. Strategy Planning
Applies to:
Hospital Operations
IT Operations
Security Operations
Transformation
Automation Adoption
Artficial Intelligence
Logistics and Supply Chain
Warehouse Operations
M&A
Cultural Due Diligence
IT and Operations Due Diligence
Software / Product Validation and Due Diligence
Skills Assessments and Team Alignment / Consolidation Planning
Business Process Optimization
10. Software Rationalization
11. PSP Development (policy, standards and procedures)
12. Governance Programs (customizable)
13. Custom Playbooks
14. Business Impact Analysis
15. Disaster Recovery Planning
16. Incident Response Planning
17. Business Continuity Planning
18. Table Top Sessions
19. Data Protection and Lifecycle Management
20. Vendor Risk Management / TPRM
21. Technology Implementations, Automation, Engineering, Integrations, Upgrades and Migrations Various solutions for each line item below:
Ansible
Apache JMeter
AppLoader
Arista
Aruba
AV
Beyond Trust
BitSight
CASB
Cisco
CloudFlare
CyberArk
Cyber AI
Data Lake
DataDog
DevOps
DLP
EDR
Elastic
ESentire
ETL Tools
Exabeam
File Integrity Monitor
Forensic security Tools
Fortinet
IAM
Insight IDR
InsightAppSec
InsightCloudSec
InsightVM
JamF
Juniper
Kubernetes
LoadNinja
LoadRunner
LogRythm
Manage Engine
MDR
Meraki
Metasploit
MFA
MS SQL
MySQL
Network as Code
Nexpose
NinjaOne
O365
Oracle
Palo Alto
PAM
Qualys
Rapid 7
RedCanary
SASE
Security Scorecard
Sentinel One
SIEM
SOAR
Sophos
Splunk SIEM
SSO
Sumo Logic
Tanium
Terraform
Threat Command
Ubiquity
Vulnerability Management
Wireless Network, automation and self-healing systems
XDR
XiiD
Zero Trust (ZTA)
ZScaler
22. IT Services
AIDC (automatic identification and data collection) hardware agnostic
Hardware Rack and Stack
Data Center Implementations, Migrations, Relocations and Consolidation
Physical to Virtual
Virtual to Virtual (migrations or upgrades)
Low Voltage Cabling and Cable Management
Managed Services
NOC
SOC
Managed IT Help-desk
Managed Firewalls and Routers
Managed Patch Management
22. Secure Access, Card, Strikes, Facial Recognition, Bio Metrics
23. Supply Chain Visibility
24. Warehouse Automation / Robotics
25. RFID
26. Forensics
Investigations
Expert Witness
DFIR
Threat Hunting (as a project or managed services)
27. CCI - Cyber Counterintelligence
Threat Hunting for new vectors and early detection of zero-day
Identification of bad actors
Geo-location for physical assets
Tracing bad actors before they act
Partner with DoD, NSA, CIA, DIA for information sharing and reporting
HumanINT, SigINT, CyberINT, OSINT
Collection CCI
Defensive CCI
Offensive CCI Planning for United States government agencies
​
Core Insights Global PMC Services (private military contractors)
​
1. Executive Protection
2. Drone Security and Drone Mitigation
3. Asset Tracking and Location
4. Personnel Recovery
5. Electronic Countermeasures
6. Physical Security Solutions
7. Armored Vehicle Escorts
8. CQB (close quarters battle) Training
9. Firearms Training
​
Contact us for more details so we can discuss your specific needs.
​