website/services.md

2.1 KiB

title layout permalink
/services home /services.html

Services

Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, building a security program from scratch, or want to focus on a specific aspect of your organization or system - we are here to help. Our experienced staff will work closely with you to understand your unique needs and create a tailor made solution that works for you.


CISO / Head of Security / Security Engineer on Demand

Leverage Distrust's team of experts as needed to assist you in building and maintaining all aspects of your security programs.

  • Network Architecture
  • Access Permissions
  • Security Hiring Advisory
  • Business Continuity
  • Secure Software Development Lifecycle
  • Physical Security
  • ... and more

Penetration Testing and Security Assessment

Distrust has a long and successful track record of helping companies find security weaknesses and ensure that they can release software confidently.

  • Web Application Penetration Testing
  • Mobile Application Penetration Testing
  • Software Supply Chain Integrity
  • Cloud Infrastructure Security
  • ... and more

Cryptographic System Design, Escrow and Consulting

Distrust specializes in building highly reliable and secure systems, via applied cryptography, for managing sensitive cryptographic material such as blockchain private keys. To achieve this our team uses a novel approach which leverages attestation, custom software, asymmetric cryptography, MPC and other methods.

  • Private Key Lifecycle Management (Generating, Storing, Sharing, Backup etc.)
  • Secure Enclaves
  • HSMs
  • Quorum Authentication Design ... and more

System Hardening

Reducing the surface area for attacks is the most effective way to reduce the likelihood of system compromise. By hardening the entire technology stack used, the attackers are left with nothing to grasp at.

  • OS Hardening and Custom Kernel Advisory
  • Production Engineering Practice
  • Reproducible / Deterministic Build Pipelines (CI/CD)
  • Immutable Infrastructure
  • Quorum Authentication Design
  • ... and more