HOME
SOLUTIONS
Vulnerability assessment

Analyze your present security set up for vulnerabilities and identify necessary improvements, and fixes to problems.

Intrusion detection

Protect your network BEFORE you have an incident and use our security monitoring & management expertise to establish a watertight intrusion detection system (IDS).

Vulnerability scanning

Hackers are scanning your network — shouldn’t you be too? We can help you scan, clean up, and protect yourself against future attacks.

Penetration Testing

Do you need a penetration test or 'Pen Test'? Find out about Roka's penetration testing service, performed by a highly skilled team of ethical hackers.

Compliance
  • NIST 800-171
  • FINRA
About
  • About Roka
  • Team
Resources
Contact
  • Home
  • Solutions
    • Vulnerability Assessment
    • Intrusion Detection Services
    • Vulnerability Scanning
    • Penetration Testing
  • Compliance
    • NIST 800-171
    • FINRA
  • About
  • Resources
  • Contact

Blog

Stay ahead of the curve with your security

In-2C-34px-TM

by Patrick Stump

Patrick Stump
The CEO and founder of Roka Security, Patrick has been a key player in both offensive cyber intrusion and security operations with multiple branches and agencies of the United States Government (USG), the military, and commercial industry.

Connect with Patrick on LinkedIn

Leave a comment Cancel reply

Recent posts

  • Cyber Security Threats for 2018Cyber Security Threats for 2018 : What to Expect
  • vulnerability assessment: what you need to knowVulnerability Assessment : What You Need To Know
  • Pen Testoverview imagePen Test: What You Need to Know Before Starting
  • a cell phone protecting against malware5 ways to protect your enterprise network against ransomware

Categories

  • Cyber Security Assessment
  • Intrusion Detection
  • Network Monitoring
  • Penetration Testing
  • Vulnerability Assessment
  • Vulnerability Scanning

Archives

  • February 2018 (1)
  • January 2018 (1)
  • November 2017 (1)
  • October 2017 (2)
  • September 2017 (1)
  • June 2017 (1)
  • May 2017 (2)
  • April 2017 (2)

Tag cloud

800-171 2018 compliance compliant cyber cyber security plan Cyber security Threats DFAR email encrypt encrypted encryption at rest gpg ids intrusion detection system intrusion prevention system intrusion protection ips MTA NIST patching patch management penetration testing pen test pgp risk security security assessment smime snort surricata threat vulnerability assessment vulnerability scan vulnerability scanning
© 2025 Roka Security | Privacy Policy | Terms & Conditions | Sitemap