Company

We act as trusted advisors who help organizations better understand and minimize overall risk across IT assets, so they can focus on what's important — their core business.

About Praetorian

Praetorian is an information security provider dedicated to helping organizations achieve risk-management success. As the leader in application, mobile, and cloud security, Praetorian helps clients identify, prioritize, and mitigate risk in the most cost-effective way possible. Combining superior technical prowess, trusted business acumen, comprehensive reporting, and unparalleled delivery, Praetorian acts as a trusted advisor to today’s leading organizations.

Through our assessment services, your organization can obtain an accurate, independent security evaluation. Through our advisory offerings, we can help your organization build, define, communicate, and enforce a comprehensive security strategy.

Our Consultants

Our team members come from a wide range of backgrounds and specialties. Previous employers include Symantec, McAfee, MIT Lincoln Labs, Rapid7, Sun Microsystems, Dell, National Instruments and PricewaterhouseCoopers. All consultants come from a computer science, engineering, or information systems discipline and many consultants have obtained masters and doctorates. Our team members include published authors, open source developers, industry researchers, and conference presenters.

Trusted by today's leading companies

Our Clients

Praetorian's expertise and client base spans all major verticals. We regularly provide expertise to Fortune 500 companies across the financial, technology, healthcare, insurance, oil & gas, and manufacturing sectors. In addition, Praetorian provides considerable consultation to government and education institutions around the United States. Because of our wide range of experience and subject matter experts, several major consulting firms also leverage Praetorian as a trusted partner on an ongoing basis.

Our Brand

Augustus Caesar created the Praetorian Guard as an elite force to protect him and subsequent Roman emperors. Only the very best soldiers who had proven their valor on the field were chosen for this honor. To this end, Praetorian was deemed a fitting name.

tactical security assessment services

Tactical Assessments Overview

Obtain an accurate understanding of your security and risk posture, while ensuring compliance with industry regulators and information security best practices. Praetorian consultants come from strong software development and network security backgrounds. This experience brings the proper insight and perspective to bear on your unique environment.

Through, thorough methodologies, our consultants assess your security exposure and provide mitigation strategies, and assist in remediation efforts. We deliver comprehensive reporting, relevant to your organization and stakeholders.

Praetorian takes a highly-customizable approach to security testing. We combine our in-depth knowledge with the use of industry standards, applicable regulatory requirements, and your specific business goals. Engagements are scoped to include one or more service lines depending on the needs of the client.

Strategic Consulting Overview

Every organizational leader should be concerned about the integrity, confidentiality, and availability of their key information assets and resources. However, many organizations lack the internal expertise required to properly develop and implement unique security policies, standards, and guidelines that are tailored to specific organizational needs. As operational environments change, these organizations will also benefit from a strong partner to assist them through an ongoing risk management lifecycle.

Praetorian delivers specialized policy and controls for organizations at every security maturity level. Our consultants leverage their in-depth knowledge of industry standards and best practices to help deploy a baseline set of security controls across all systems within your organization and then specialize that security plan for the specific mission, environment of operation, or technology.

Our aim is to develop policy and control sets driven by a customized risk management framework that serves the unique needs of each client, while helping their organization defend its systems to the greatest extent possible.

strategic security consulting services

We make security our business, so you don't have to make it yours.

As threats evolve and grow increasingly sophisticated, it is difficult for organizations to keep pace with the rapidly changing security landscape. Securing an enterprise demands proactive and ongoing vigilance by your IT staff. Such complex environments also require your organization to forge relationships with trusted service and product providers, so you can focus on what's important—your core business.

security assessment advisory servicesToday, creating a truly secure IT infrastructure requires access to highly specialized knowledge, intelligence, and expertise in order to stay at least one step ahead of the evolving risks. Because Praetorian is an authority on information security, your business can leverage our subject matter expertise to solve these challenging business problems. We offer a comprehensive portfolio of security services and solutions tailored to meet specific client requirements. At Praetorian, we make security our business, so you don't have to make it yours.

Praetorian's risk assessment and management solutions use an optimal balance between people, process, and technology. Risk management is the key to a successful security strategy. We help organizations identify risks to their information security and prioritize those risks so that they can allocate resources in the most cost effective way. We also work with organizations to identify an appropriate risk management strategy, which is usually a blend of the following:

Risk Management Strategy

  1. Risk Mitigation Mitigate risk through security remediation and countermeasures

  2. Risk Transfer Transfer risk contractually to a 3rd party, or insurance provider

  3. Risk Avoidance Avoid risk by eliminating an existing online or network capability

  4. Risk Acceptance Accept risk based on clear understanding of exposure and companies appetite for risk

During each engagement, Praetorian consultants meet with you regularly and communicate high-risk findings immediately. At the end of each engagement, we deliver a comprehensive report that is valuable to both the technical and executive levels. For technical staff, we detail the immediate threats across your enterprise and recommend the appropriate responses. For executives, we clearly communicate systemic issues and solutions, prioritizing risk management strategies based on resource constraints and risk goals.

Project Management

Alongside Praetorian's technical prowess and detailed assessment methodology, Praetorian also implements a standardized project management plan to ensure quality and on time results. The following list and corresponding diagram represent the typical workflow of an engagement.

Engagement Workflow and Project Management
  1. The process begins with a response to a client proposal.

  2. Once the proposal is accepted, mutually agreeable start and end dates are decided between Praetorian and the client and a Master Service Agreement (MSA), Mutual Non-Disclosure Agreement (NDA), and Statement of Work (SOW) are executed.

  3. A pre-engagement call is conducted with the client at least one week prior to the engagement's scheduled kick off. The purpose of the call is to introduce team members, exchange contact information, and discuss logistics. This will help ensure consultant utilization is maximized once the engagement is underway.

  4. The engagement begins on the scheduled start date. Weekly updates are provided over the course of the project.

  5. Once testing has completed, a draft report is delivered to the client one week after the engagement's conclusion.

  6. The client has ten business days to review the draft report and provide comments.

  7. At the close of the review window, comments are incorporated and a final draft is submitted to the client in PDF format.

  8. A final closeout meeting is held to discuss the results of the assessment and answer any outstanding questions.

  9. The process concludes with the submission of feedback forms and invoices.