Historically, cyber security controls have been an afterthought when deploying/upgrading or updating applications and servers.

Nowadays, customers are asking recon to assist their Application and ICT teams to bake cyber into the build of their operational systems.  

 

Included in every deployment
  • Project Management
  • Living documentation
  • SOP manuals
  • Internal testing (recon-Lab)
SERVICE

Architecture design

recon architecture

cyber consulting services

recon security maturity services

security assessment

vCISO

vCISO

Risk management

Risk management

Architecture design

Architecture design