website/index.md

160 lines
5.1 KiB
Markdown

---
title: /home
layout: home
permalink: /index.html
---
<h2>Understand and mitigate security threats others won't see coming.</h2>
We believe security compromises to your systems and personnel are *inevitable*. Allow our team of expert technologists to help you reduce the likelihood and impact of security risks by thinking from first principles.
<br/>
<a href="/contact.html" class="action-button">Request a Quote</a>
<br/>
---
<section>
<h3>Some of the companies we have provided security services for include...</h3>
<br/>
<div class="flex-container companies">
<div>
<a href="https://bitgo.com">
<img src="assets/base/companies/bitgo-logo-white.svg" />
</a>
</div>
<div>
<a href="https://coinbase.com">
<img src="assets/base/companies/coinbase-logo-blue.svg" />
</a>
</div>
<div>
<a href="https://bishopfox.com">
<img src="assets/base/companies/bishop-fox-dark.png" />
</a>
</div>
</div>
<br>
<div class="flex-container companies">
<div>
<a href="http://www.ledn.io/">
<img src="assets/base/companies/ledn-white.svg" />
</a>
</div>
<div>
<a href="http://www.falconx.io/">
<img src="assets/base/companies/falconx-white.svg" />
</a>
</div>
<div>
<a href="https://exodus.com">
<img src="assets/base/companies/exodus-white.svg" />
</a>
</div>
</div>
<br/>
<div class="flex-container companies">
<div>
<a href="https://siderolabs.com">
<img src="assets/base/companies/sidero-labs-white.png" />
</a>
</div>
<div>
<a href="https://zoom.com">
<img src="assets/base/companies/zoom.webp" />
</a>
</div>
<div>
<a href="https://mystenlabs.com">
<img src="assets/base/companies/mysten-labs-white.svg" />
</a>
</div>
</div>
<br/>
<div class="flex-container companies">
<div>
<a href="http://www.hashicorp.io/">
<img src="assets/base/companies/hashicorp-white.png" />
</a>
</div>
<div>
<a href="http://www.primetrust.com/">
<img src="assets/base/companies/prime-trust-white.svg" />
</a>
</div>
<div>
<a href="http://www.distributedglobal.com/">
<img src="assets/base/companies/distributed-global.jpeg" />
</a>
</div>
<div>
<a href="http://www.b1.com/">
<img src="assets/base/companies/block-one-dark.svg" />
</a>
</div>
<div>
<a href="https://fitbit.com">
<img src="assets/base/companies/fitbit-white.png" />
</a>
</div>
</div>
<br/>
<div class="flex-container companies">
<div>
<a href="http://www.turnkey.io/">
<img src="assets/base/companies/turnkey-black.svg" />
</a>
</div>
<div>
<a href="https://dfns.co">
<img src="assets/base/companies/dfns-color.png" />
</a>
</div>
<div>
<a href="https://polychain.capital/">
<img src="assets/base/companies/polychain-capital.png" />
</a>
</div>
<div>
<a href="http://www.ankr.com/">
<img src="assets/base/companies/ankr.png" />
</a>
</div>
<div>
<a href="http://www.investvoyager.com/">
<img src="assets/base/companies/voyager-white.png" />
</a>
</div>
</div>
<br/>
<br/>
</section>
---
<section>
<h1>Services</h1>
<p>Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, building a security program from scratch, or want to focus on a specific aspect of your organization or system - we are here to help. Our experienced staff will work closely with you to understand your unique needs and create a tailor made solution that works for you.</p>
<div class="flex-container">
<div class="sub-container">
<h3>CISO / Head of Security / Security Engineer on Demand</h3>
<p>Leverage Distrust's team of experts as needed to assist you in building and maintaining all aspects of your security programs.</p>
</div>
<div class="sub-container">
<h3>Penetration Testing and Security Assessment</h3>
<p>Distrust has a long and successful track record of helping companies find security weaknesses and ensure that they can release software confidently.</p>
</div>
</div>
<div class="flex-container">
<div class="sub-container">
<h3>Cryptographic System Design, Escrow and Consulting</h3>
<p>Distrust specializes in building highly reliable and secure systems, via applied cryptography, for managing sensitive cryptographic material such as blockchain private keys. To achieve this our team uses a novel approach which leverages attestation, custom software, PKI, MPC and other methods.</p>
</div>
<div class="sub-container">
<h3>System Hardening</h3>
<p>Reducing the surface area for attacks is the most effective way to reduce the likelihood of system compromise. By hardening the entire technology stack used, the attackers are left with nothing to grasp at.</p>
</div>
</div>
<div class="button-container">
<a class="action-button" href="/services.html">Learn more</a>
</div>
</section>