Welcome, I am a Senior Security Advisor for Knowledge Consulting Group, the Trusted Cyber Advisor to the Federal Government and the Private Sector. I've created landing pages on LinkedIn for specific service offerings, to assist organizations with connecting with the right people to address specific requirements. KCG’s penetration testing services is lead by Andrew Whitaker, a nationally recognized expert on computer hacking, an author of best-selling networking and security books, and an award winning technical trainer. With twenty years of professional experience, he has helped hundreds of organizations around the globe with improving their security posture. He has authored seven books, including Chained Exploits: Advanced Hacking Attacks from Start to Finish (Addison-Wesley) and Penetration Testing and Network Defense (Cisco Press). He has held many certifications over the years, including CISSP, CEI, LPT, CEH, CEPT, CPT, CICP, CHFI, ECSA, CCNP, CCSP, CCVP, CCDP, CCNA:Security, CCDA, CCENT, LPIC-1, MCT, MCTS, MCSE, CNE, EMCPA, CTP, A+, Network+, Security+, Convergence+, Linux+, CEREA, WAPT, CSSA, and SSBBP. Andrew is also a frequent conference speaker and has given talks at Defcon, ISC(2) SecurePhilly, ChicagoCon, GFIRST8, TakeDownCon, BSides, API Cybersecurity Conference, and RSA. Other members of the KCG pen-testing team have also been published, and have developed hacking tools which are now standard in the industry. Our team is second to none in experience and expertise. Recent articles: http://www.economist.com/news/business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-white-hats-rescue http://www.tomsguide.com/us/hack-power-grid,news-18397.html Please email me at [email protected] to arrange a free consultation.
SaaS Adoption
SaaS Adoption indicates the level of adoption by this company of software as a service services.
Cloud Adoption
Cloud Adoption indicates the level of adoption by this company of cloud services.
IT Footprint
IT Footprint gives a relative indication of how much IT services this company consumes.
IT Spend
IT Spend shows roughly how much this client spends on IT per year in USD.
Enlyft tracks the use of over 15,000 technologies and has proprietary data on over 18 million companies worldwide.
Dynamic Service Views uses 5 different technologies from 77 different vendors. They have above average use of several technologies including Symantec Endpoint Protection, Java and Perl.
Dynamic Service Views uses products from 71 different product categories. They are particularly heavy users of products in Network Security, Operating Systems, and Backup Software.
Enlyft tracks the use of over 15,000 technologies and has proprietary data on over 18 million companies worldwide.
Technology | Category | Vendor | Usage |
---|---|---|---|
Symantec Endpoint Protection | Endpoint Security | Symantec | |
Java | Programming Languages | Oracle | |
Perl | Programming Languages | Perl | |
Python | Programming Languages | Python Software Foundation | |
Zendesk | Customer Service Management | Zendesk, Inc. |
What other companies use Symantec Endpoint Protection?
Who are the biggest users of Programming Languages?
What countries, industries, and company sizes are most likely to use Perl?