MEProtect Services
MEProtect services combine MEP engineering with cybersecurity advisory and consulting services. Each service offering is tailored to meet the needs of your business. .
TECHNICAL DISCOVERY
MEProtect offers a unique combination of deep industry expertise in the MEP and building systems industry together with a bench of more than 50 credentialed ethical hackers and security engineers. Our Technical Discovery services therefore offer a unique and in-depth perspective on your building and OT environment’s security posture, from both an engineering and security perspective.


Site Survey & Equipment Inventory
Topology Documentation (Riser/Plans)


Analysis of Physical Access Controls
Open Source Intelligence Analysis
Vendor Cyber Due Diligence Questionnaires
Digital Corporate "Footprint" Analysis
TECHNICAL DISCOVERY
MEProtect offers a unique combination of deep industry expertise in the MEP and building systems industry together with a bench of more than 50 credentialed ethical hackers and security engineers. Our Technical Discovery services therefore offer a unique and in-depth perspective on your building and OT environment’s security posture, from both an engineering and security perspective.
Site Survey & Equipment Inventory
Topology Documentation (Riser/Plans)
Analysis of Physical Access Controls
Open Source Intelligence Analysis
Vendor Cyber Due Diligence Questionnaires
Digital Corporate "Footprint" Analysis
NETWORK SECURITY ASSESSMENTS
Our security engineers and certified ethical hackers provide an in-depth analysis of your network security and highlight IT and OT vulnerabilities that would allow an attacker to steal administrative credentials, establish a persistent foothold on the internal network, and/or disrupt data communications between internal and external systems.


Network Vulnerability Scanning
IT and OT Networks
Building Systems
Network and Wireless Traffic Analysis (IT & OT protocols)


Penetration Testing
Networks
Websites
Devices
Honey Pot Analysis
NETWORK SECURITY ASSESSMENTS
Our security engineers and certified ethical hackers provide an in-depth analysis of your network security and highlight IT and OT vulnerabilities that would allow an attacker to steal administrative credentials, establish a persistent foothold on the internal network, and/or disrupt data communications between internal and external systems.
Network Vulnerability Scanning
IT and OT Networks
Building Systems
Network and Wireless Traffic Analysis (IT & OT protocols)
Penetration Testing
Networks
Websites
Devices
Honey Pot Analysis
CYBER ADVISORY AND ‘VIRTUAL CISO’ SERVICES
Our experienced, senior MEP engineers and cybersecurity experts work directly with your IT and OT personnel as well as with your executive leadership to improve your firm’s overall security policies and procedures within the context of your operating priorities.



IT & OT Asset Inventory
Security Policies and Procedures
12- and 24-month “Security Roadmap” Planning



Consequence & Cascading Failure Analysis
Network Data Discovery
Structured and Unstructured Data Types
Scoring to Compliance Frameworks
Vendor Due Diligence Reviews
CYBER ADVISORY AND ‘VIRTUAL CISO’ SERVICES
Our experienced, senior MEP engineers and cybersecurity experts work directly with your IT and OT personnel, as well as with your executive leadership to improve your firm’s overall security policies and procedures within the context of your operating priorities.
IT & OT Asset Inventory
Security Policies and Procedures
12- and 24-month “Security Roadmap” Planning
Consequence & Cascading Failure Analysis
Network Data Discovery
Structured and Unstructured Data Types
Scoring to Compliance Frameworks
Vendor Due Diligence Reviews
REMEDIATION & SECURITY OPERATIONS
We offer security monitoring to detect security incidents on your networks or endpoints, and our on-site engineering teams stand ready to assist directly with network design and network engineering to improve the security posture of your IT and OT networks.


Network Design Engineering
SOC Monitoring & Reporting
24x7 Security Operations
Center (SOC)
Network and Endpoint
Detection
Containment, and
Remediation


