SERVICES


MEProtect Services




MEProtect services combine MEP engineering with cybersecurity advisory and consulting services. Each service offering is tailored to meet the needs of your business.

.



TECHNICAL DISCOVERY

MEProtect offers a unique combination of deep industry expertise in the MEP and building systems industry together with a bench of more than 50 credentialed ethical hackers and security engineers. Our Technical Discovery services therefore offer a unique and in-depth perspective on your building and OT environment’s security posture, from both an engineering and security perspective.







Site Survey & Equipment Inventory

Topology Documentation (Riser/Plans)


Analysis of Physical Access Controls

Open Source Intelligence Analysis

    Vendor Cyber Due Diligence Questionnaires

    Digital Corporate "Footprint" Analysis



TECHNICAL DISCOVERY

MEProtect offers a unique combination of deep industry expertise in the MEP and building systems industry together with a bench of more than 50 credentialed ethical hackers and security engineers. Our Technical Discovery services therefore offer a unique and in-depth perspective on your building and OT environment’s security posture, from both an engineering and security perspective.

Site Survey & Equipment Inventory

Topology Documentation (Riser/Plans)

Analysis of Physical Access Controls

Open Source Intelligence Analysis

Vendor Cyber Due Diligence Questionnaires

Digital Corporate "Footprint" Analysis



NETWORK SECURITY ASSESSMENTS

Our security engineers and certified ethical hackers provide an in-depth analysis of your network security and highlight IT and OT vulnerabilities that would allow an attacker to steal administrative credentials, establish a persistent foothold on the internal network, and/or disrupt data communications between internal and external systems.








Network Vulnerability Scanning

     IT and OT Networks

     Building Systems

Network and Wireless Traffic Analysis (IT & OT protocols)










Penetration Testing

    Networks

    Websites

    Devices

Honey Pot Analysis



NETWORK SECURITY ASSESSMENTS

Our security engineers and certified ethical hackers provide an in-depth analysis of your network security and highlight IT and OT vulnerabilities that would allow an attacker to steal administrative credentials, establish a persistent foothold on the internal network, and/or disrupt data communications between internal and external systems.

Network Vulnerability Scanning

IT and OT Networks

Building Systems

Network and Wireless Traffic Analysis (IT & OT protocols)

Penetration Testing

Networks

Websites

Devices

Honey Pot Analysis



CYBER ADVISORY AND ‘VIRTUAL CISO’ SERVICES

Our experienced, senior MEP engineers and cybersecurity experts work directly with your IT and OT personnel as well as with your executive leadership to improve your firm’s overall security policies and procedures within the context of your operating priorities.





IT & OT Asset Inventory

Security Policies and Procedures

12- and 24-month “Security Roadmap” Planning








Consequence & Cascading Failure Analysis

Network Data Discovery

Structured and Unstructured Data Types

Scoring to Compliance Frameworks

Vendor Due Diligence Reviews



CYBER ADVISORY AND ‘VIRTUAL CISO’ SERVICES

Our experienced, senior MEP engineers and cybersecurity experts work directly with your IT and OT personnel, as well as with your executive leadership to improve your firm’s overall security policies and procedures within the context of your operating priorities.

IT & OT Asset Inventory

Security Policies and Procedures

12- and 24-month “Security Roadmap” Planning

Consequence & Cascading Failure Analysis

Network Data Discovery

Structured and Unstructured Data Types

Scoring to Compliance Frameworks

Vendor Due Diligence Reviews



REMEDIATION & SECURITY OPERATIONS

We offer security monitoring to detect security incidents on your networks or endpoints, and our on-site engineering teams stand ready to assist directly with network design and network engineering to improve the security posture of your IT and OT networks.



Network Design Engineering

SOC Monitoring & Reporting

24x7 Security Operations

    Center (SOC)

Network and Endpoint

    Detection

Containment, and

    Remediation













Virtual Employee Awareness Training

Digital Forensics & Incident Response

Onsite Incident Handling &

    Remediation

Digital Forensics (Network, Endpoints,

    Devices)

Coordination: Legal, PR, Payments

Quarterly Email Phishing Simulations



REMEDIATION & SECURITY OPERATIONS

We offer security monitoring to detect security incidents on your networks or endpoints, and our on-site engineering teams stand ready to assist directly with network design and network engineering to improve the security posture of your IT and OT networks.

Network Design Engineering

SOC Monitoring & Reporting

24x7 Security Operations Center (SOC)

Network and Endpoint Detection

Containment, & Remediation

Virtual Employee Awareness Training

Digital Forensics & Incident Response

Onsite Incident Handling & Remediation

Digital Forensics (Network, Endpoints, Devices)

Coordination: Legal, PR, Payments

Quarterly Email Phishing Simulations