Security Consulting

As NAND’s initial core competency, our security offering is extensive. Through comprehensive risk analysis, we identify vulnerabilities, assess the potential impact of security breaches, and prioritize areas that require attention. This process enables us to develop tailored security solutions that are both proactive and cost-effective, ensuring that security measures align with our client's specific needs and risk tolerance.

  • Security Risk Analysis

    In any security consulting engagement, risk analysis plays a pivotal role as it forms the foundation upon which effective security strategies are built. Security is inherently linked to risk, and understanding and mitigating these risks are imperative to safeguarding an organization's assets, reputation, and operations.

    By addressing risk concurrently and synergistically with security efforts, we not only enhance the protection of critical assets but also contribute to the overall resilience and success of the organization in an ever-evolving threat landscape.

  • Systems & Firmware Analysis

    Our R&D work and new product development experience provide us with a wealth of knowledge on large- and small-system security architecture, as well as hardware firmware analysis.

    Building on extensive work in protocol development and cryptography fundamentals, we pull apart hardware builds to look at underlying chip and SOC choices, firmware, and systems updates. SIMs, eSIMs, and mobile money are key areas of interest and analysis. Our foundation for this work is our library of thousands of security white papers and our testing lab, where we duplicate academic findings to verify real-world impacts.

  • Enterprise Security Fitness

    Most enterprise systems today are hybrids of legacy software, heavily customized COTS and outsourced cloud services. Many organizations have stitched these together with insecure, poorly documented APIs running in cleartext. Security was rarely considered for legacy systems because historically it was housed in a well protected data center with extensive physical security. Unfortunately, “defense in depth" for current hybrid systems typically means a single level of VPN shell protecting key company assets.

    Our clients range from finance to Federal agencies to NGOs. We approach each engagement with deep, architectural analysis of systems and pragmatic deployment techniques.