Compare commits

..

2 Commits

Author SHA1 Message Date
Anton Livaja 047a23750b
integrate feedback 2023-11-10 17:52:15 -05:00
Anton Livaja 6644765283
content fixes 2023-11-04 14:22:12 -04:00
2 changed files with 15 additions and 8 deletions

View File

@ -29,9 +29,12 @@
<div class="flex-container-inner"> <div class="flex-container-inner">
<div class="text-well"> <div class="text-well">
<h2>We specialize in working with high risk clients.</h2> <h2>We specialize in working with high risk clients.</h2>
<p>If you protect valuable assets or data, or provide software to others that do, your adversaries will not play fair. We want to help you protect your team and remove single points of failure in your stack.</p> <p>If you protect valuable assets or data, or provide software to others that do, your adversaries will not play fair. We want to help you protect your team and users, and remove single points of failure in your stack.</p>
</div> </div>
</div> </div>
<br />
<div class="flex-container-inner"> <div class="flex-container-inner">
<div class="companies"> <div class="companies">
<div> <div>
@ -128,7 +131,7 @@
<div class="flex-container-inner" style="align-items: baseline"> <div class="flex-container-inner" style="align-items: baseline">
<div class="text-well"> <div class="text-well">
<h1>Services</h1> <h1>Services</h1>
<p>Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, need help building a security program from scratch, or want to focus on a specific aspect of your organization or system - we are here to help. Our experienced staff will work closely with you to understand your unique needs and create a tailor made solution that works for you.</p> <p>Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, want to create or improve an open source security tool, or want to focus on assessing a specific aspect of your organization or system - we are here to help. Our experienced staff will collaborate closely with you to understand your unique needs and create a tailor made solution that works for you.</p>
<div class="button-container"> <div class="button-container">
<a class="action-button" href="/services.html">Learn more</a> <a class="action-button" href="/services.html">Learn more</a>
<a href="/contact.html" class="action-button">Request a Quote</a> <a href="/contact.html" class="action-button">Request a Quote</a>
@ -144,7 +147,7 @@
<div class="text-well"> <div class="text-well">
<h3>Security Assessment</h3> <h3>Security Assessment</h3>
<p>We offer full stack security assessments, covering anything that is in scope for a sophisticated adversary, like compromising a third party library, bribing a devops engineer, finding a oversight in your code, or otherwise. While we will point out specific flaws we find, we feel we offer the most value in helping you identify where you can make strategic improvements to your architecture to take entire classes of risk off the table</p> <p>We offer full stack security assessments, covering anything that is in scope for a sophisticated adversary, such as compromising a third party library, bribing a devops engineer, finding a oversight in your code, or otherwise. While we will point out specific flaws we find, we feel we offer the most value in helping you identify where you can make strategic improvements to your architecture to take entire classes of risk off the table.</p>
</div> </div>
<br /> <br />
@ -153,7 +156,7 @@
<div class="text-well"> <div class="text-well">
<h3>Security Engineering</h3> <h3>Security Engineering</h3>
<p>Our team is comprised security engineers with past lives as full time system administrators, and software engineers. We have extensive first hand experience in actually implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p> <p>Our team is comprised of security engineers with past lives as full time system administrators and software engineers. We have extensive first hand experience in implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
</div> </div>
<br /> <br />
@ -162,7 +165,7 @@
<div class="text-well"> <div class="text-well">
<h3>Retained Security Support</h3> <h3>Retained Security Support</h3>
<p>If you need additional security support, you can hire our team on retainer to have us available when you need us most. Our varied expertise allows us to assist you with a wide array of security related challenges and activities.</p> <p>We offer monthly retainer contracts to augment your existing security team with access to our combined experience as needed. You can drop questions to our team in a chat, or include us in security-relevant meetings. Almost anything an in-house security team might do to protect your organization is in scope for us as well, including qualifying candidates, conducting interviews, reviewing code, evaluating third party risks, or being a security voice in the room when you are planning new products.</p>
</div> </div>
<br /> <br />
@ -174,6 +177,10 @@
<p>Rather than write the same document or tool 10 times and bill each client for it, we focus our unused retainer hours on open sourcing every document and tool we legally can, so we can focus our time with clients on their unique situations. If we are doing public work you would like so see more of, or that -almost- meets your needs, we would love to hear that and figure out a path to see your needs met.</p> <p>Rather than write the same document or tool 10 times and bill each client for it, we focus our unused retainer hours on open sourcing every document and tool we legally can, so we can focus our time with clients on their unique situations. If we are doing public work you would like so see more of, or that -almost- meets your needs, we would love to hear that and figure out a path to see your needs met.</p>
</div> </div>
</div> </div>
<br />
<br />
<a href="/contact.html" class="action-button">Request a Quote</a>
</section> </section>
</main> </main>
{%- include footer.html -%} {%- include footer.html -%}

View File

@ -13,7 +13,7 @@
<div class="flex-container-inner"> <div class="flex-container-inner">
<div class="text-well"> <div class="text-well">
<h2>How can we help you?</h2> <h2>How can we help you?</h2>
<p>Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, want to create or improve an open source security tool, or want to focus on assessing a specific aspect of your organization or system - we are here to help. Our experienced staff will work closely with you to understand your unique needs and create a tailor made solution that works for you.</p> <p>Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, want to create or improve an open source security tool, or want to focus on assessing a specific aspect of your organization or system - we are here to help. Our experienced staff will collaborate closely with you to understand your unique needs and create a tailor made solution that works for you.</p>
<br /> <br />
<a href="/contact.html" class="action-button">Request a Quote</a> <a href="/contact.html" class="action-button">Request a Quote</a>
<br /> <br />
@ -29,7 +29,7 @@
<div class="flex-container-inner"> <div class="flex-container-inner">
<div class="text-well"> <div class="text-well">
<h3>Security Assessment</h3> <h3>Security Assessment</h3>
<p>Holistic assessments of systems tailored to your needs. We leverage our in house expertise to analyze your system, thinking from first principles, in order to ensure its design, implementation and deployment all work coherently to establish a strong security posture. The methodologies we leverage vary based on the context and client needs.</p> <p>We offer full stack security assessments, covering anything that is in scope for a sophisticated adversary, such as compromising a third party library, bribing a devops engineer, finding an oversight in your code, or otherwise. While we will point out specific flaws we find, we feel we offer the most value in helping you identify where you can make strategic improvements to your architecture to take entire classes of risk off the table.</p>
</div> </div>
</div> </div>
<div class="flex-container-inner"> <div class="flex-container-inner">
@ -49,7 +49,7 @@
<div class="flex-container-inner"> <div class="flex-container-inner">
<div class="text-well"> <div class="text-well">
<h3>Security Engineering</h3> <h3>Security Engineering</h3>
<p>Our team consists of engineers who are experienced in a wide range of areas spanning across applied cryptography, HSMs, secure coding using languages such as rust and golang, quorum authentication, kernel hardening, CI/CD hardening and more. Leverage our experience to ensure your systems are secure by design and use the best available architecture patterns.</p> <p>Our team is comprised of security engineers with past lives as full time system administrators and software engineers. We have extensive first hand experience in implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.</p>
</div> </div>
</div> </div>
<div class="flex-container-inner"> <div class="flex-container-inner">