Left ArrowRight ArrowCloseLocationMenuTriangle CopySearchFacebookGoogle PlusLinkedInTwitterYoutube

Vulnerability Assessments, Penetration Testing and Regulatory Compliance Reporting

Vulnerability Assessment

Northeastern, LLC performs assessments of threats and vulnerabilities and determines any changes from baseline configurations or security policies, assesses the level of enterprise risk, and develops and/or recommends appropriate mitigation steps. Some of the areas of concentration are Network Mapping, Vulnerability Scanning, Phishing Assessment, Wireless Assessment, Web Application Assessment, Operating System Security Assessment, Database Assessment, Vendor Agreements and Corporate Compliance.

Penetration Testing

Northeastern, LLC’s Penetration Testing simulates an attacker seeking to access sensitive assets and information by taking advantage of security vulnerabilities across the technology landscape. Our approach not only identifies exposures, but also reveals how networks designed for day-to-day business operations can provide attackers with pathways to critical systems and data. We provide two options:

Option A: Automated External & Internal Testing

Option B: Manual External & Internal Testing

Regulatory Compliance Reporting

Northeastern, LLC understands that in today’s complex world, more and more companies are needing to adhere to government mandated regulatory compliance requirements. Through the use of our Unified Security Management Platform (USM™) , we have the unique ability to help organizations achieve compliance with regulations such as PCI DSS, GLBA, FISMA, NERC CIP, FERPA, and SOX.


In addition, with Risk Mitigation at the core of our security services portfolio, we have a dedicated team of security analyst that will exceed your expectations in performing the following services:

Risk Assessments

  • Maturity Assessments
  • Audit and Compliance

Industry-Specific Security Services

  • HIPAA Compliance and Testing
  • SSAE 16 Audit Preparation

Threat Protection

  • Threat Intel
  • Security Awareness Training
  • DDoS Testing and Mitigation
  • Data Loss Prevention