Phenomenati
Phenomenati
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources
  • More
    • Home
    • The Future
      • Cyber Entropy™
      • The Decisive SOC
      • Augmented Intelligence
      • A SOC Taxonomy
    • Services
      • Cyber101 for the Board
      • Cyber Risk Assessments
      • Cyber ShadowBreaker™
      • Cybersecurity Strategy
      • Cybersecurity Design
      • Risk Level Agreements
      • SecOps Communications
      • Case Studies
    • Partners
      • Technology Vendors
      • Service Providers
    • About
      • Leadership
      • Contact Us
    • Resource Center
      • Essential Reading/Viewing
      • Frameworks, Standards
      • Threat Intel & Dashboards
      • Industry ISACs
      • Cyber Reconnaissance
      • Vulnerability Management
      • Scanning & Pen Testing
      • Monitoring, IDS, SIEM
      • IOC Scanning
      • Analytics
      • Rootkit Detection
      • Incident Response
      • DFIR Resources
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources

Client Case Studies

These are a few examples of active client projects where Phenomenati is helping to realize a generational shift in information security for global scale organizations.


Contact us to discuss how you can leverage this expertise, enterprise discipline, strategy, design, and information security best practices to suit the specific needs of your own business.

Contact Us >>

Project Quicksilver

A global VDaaS project...


  • for a very large, multi-national organization,
  • delivering business continuity, desktop standardization, and datacenter consolidation


Private, “community” cloud...

  • 6+ geographically distributed datacenters,
  • Citrix, ESX, hyper-converged appliances, etc.

Serving 10s of 1000s of users, internationally distributed across…

  • 9 major Business Units
  • ~35 minor Business Units


Phenomenati is performing...

  • independent, internal IT/IS audit,
  • comprehensive risk assessment, including business impact analysis (BIA),
  • security program strategy development,
  • security architecture and controls design, and
  • technology evaluations.

Project Umbra Ruptor

A Global Security Operations Center (gSOC) project...


  • for a very large, multi-national organization,
  • grown significantly through years of M&A activity


Integrating...


  • 30 existing local Security Operations Centers (SOCs, CIRTs, CERTs, etc.),
  • each purpose-built to support their respective organizations, now Business Units within the parent


Phenomenati is performing...


  • independent audit (assessment) of the existing environment,
  • strategy development for the global security operations center,
  • operational design for inter-SOC communications and work sharing,
  • global security ops center architecture and system-of-systems design (applying our SOC Taxonomy),
  • global cyber threat intelligence center design,
  • technology evaluations, and
  • strategy development for implementation/deployment/rollout.

Project Dragon's Locker

A systems (tools) integration project in an enterprise Security Operations Center (SOC)...


  • for a U.S. national organization,
  • grown highly dynamically in recent years
     

Integrating...


  • 50+ existing (best of breed) information security monitoring, incident response, and digital forensics tools,
  • into a single, system-of-systems toolset for the SOC
     

Phenomenati is performing...

  • independent audit/assessment of the existing environment,
  • operational design to re-engineer legacy SOC processes,
  • updating existing cyber threat intelligence processing concepts,
  • system-of-systems design for the integrated suite,
  • independent technology evaluations, and
  • strategy development for implementation.

Project Panda's Roar

Zero Trust Architecture evolution of a commercial SaaS offering.


A global SaaS offering…


  • Serving a global community of 100s of 1000s of users


Redesigning the system architecture to improve confidentiality (privacy) and integrity for end-users...


  • Micro-services design
  • Containerization
  • Zero-Trust architecture
  • Compartmentalization/Isolation
  • Cloud-browser based front end


Phenomenati has performed/is performing...


  • independent penetration testing of the existing platform, using leading commercial service provider
  • complete redesign of the SaaS system architecture, in cooperation with existing product team
  • comprehensive risk assessment for the business, including business impact analysis (BIA),
  • security program strategy development,
  • operational security architecture and controls design, and
  • technology evaluations

Phenomenati

Conflict – Risk – Knowledge – Decisions

 

Whether you are just getting started, or are evolving your existing Cyber Security Operations... 


Our team can help you develop a practical way forward for securing your Organization.

It's Your Move

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cancel

Copyright © 2023 Phenomenati - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept