TROJAN HORSE SECURITY
Security Equipment & Systems Consultants, Data Systems-Consultants & Designers, Information Bureaus & Services
CLOSED NOW:
Closed
Sponsored Links
Top Home Security
Serving the Washington area.
Photos and Videos
Be the first to add a photo!
Is your Corporation Vulnerable to a Cyber Attack?Are you sure your clients personal information is secure from hackers? THS can Protect your Information from Attackers!! Trojan Horse Security "protecting Global Information one client at a time"
- HoursCLOSED NOW
- Regular Hours:
Mon - Fri Sat - Sun Closed - Phone:
Main - 202-507-5773
Fax - 202-507-5601
- Address:
- 2200 Pennsylvania Ave NW Washington, DC 20037
- Email:
- Link:
- Categories
- Security Equipment & Systems Consultants, Data Systems-Consultants & Designers, Information Bureaus & Services
- Services / Products
- Trojan Horse Security is headquartered in Washington DC, just down the street from the White House. We are specialists in corporate security and pride ourselves in only employing the very best consultants in the world. All of our consultants have over 10 years experience and are industry leaders. They have all, at one point in time, worked for a major consultancy in a senior role.??We have a team of the best Information Security consultants in the business. We only hire lead senior consultants that have at least 10 years in their specialty (Penetration Testing, Regulatory Compliance, etc) and that have been the lead in a major consultancy such as IBM, Accenture, etc. We are able to offer the full spectrum of Information Security Services such as Penetration Testing, Web Application Security Assessments, Corporate Security Assessments and Regulatory Compliance Auditing (PCI, HIPAA,SOX etc..) to name just a few. * External Penetration Testing External Testing Social Engineering Spear Phishing War Dialing * Internal Penetration Testing Internal Testing Physical Testing Wireless Testing * Web Application Security Assessments (not including code review. Pricing for code review is dependent on the size of the application) Penetration Testing Back-end Vulnerability Assessment System Configuration Analysis (Server & Networking Equipment) Architecture Review Policy & Procedure Review Interviews with Key Employees Code Review * Corporate Security Assessments External Vulnerability Scans Internal Vulnerability Scans System Configuration Analysis (Server & Networking Equipment) Architecture Review Policy & Procedure Review Interviews with Key Employees Physical Security Review Employee Hiring &Termination Process Review Contact us today for a free consultation to learn how we can help you find where your vulnerabilities really are - before an attacker helps themselves.
- Payment Options
- Location
- Domestic & International
- Neighborhoods
- Dupont Circle, Northwest Washington, Connecticut Avenue - K Street
- Amenities
- SENIOR LEVELWe never hire anyone junior or mid-level. In fact, Trojan Horse Security was established because the founders saw their old consultancy firms sending out junior consultants with minimal or no experience and charging their clients for senior level resources (ask your current provider how experienced your last consultant was). CLIENT VARIETYTrojan Horse Security serves all sizes of companies from the Fortune 500 to SMEs. In our book, no job is too big or too small. We have the consultants and resources to handle any size project and carry it out with the best service in the industry. COMPETITIVELY PRICEDWe are consultant owned so we are able to give the most dedicated service and still out bid any other consultancy guaranteed. We can do this because of the way we manage our company; we have a very flat structure and our consultants self-manage their projects eliminating the unnecessary cost of project managers. All of this goes towards saving your corporation money leaving you with only one thing to pay for security. * Guaranteed Lead Senior Consultant * Guaranteed to beat any rate and always lowest cost * FREE 24x7 telephone consulting support * UNLIMITED IPs, phishing emails, web pages etc (We never set limits when none are necessary) * UNLIMITED retesting of discovered vulnerabilities until re-mediated * Licensing available for UNLIMITED testing of applications and networks * Unbeatable customer service
Contact Info
Data provided by one or more of the following: Thryv, Data Axle, Yext.