About Us

Since 1995 we have been assisting companies with security solutions. We have become well-established, conducting thousands of Vulnerability Assessments, including Policy Compliancy, IT Security Consulting, Vulnerability Management, Web Application Scanning, and PCI Data Security Certification. As cyber security threats increase all over the world, we're seeing a heightened concern in how small businesses and their owners view online security. Specifically, we're seeing thousands of businesses ramping up their security efforts and making the issue a much bigger priority. Are you? Internet Security Consulting (ISCI) provides cyber security consulting to a broad spectrum of customers and organizations from New York City to Los Angeles. We work in many different industry sectors, from individuals to some of the largest financial and commercial institutions all over the world.

For many years Internet Security Consulting, Inc. has been the company I can lean on for cyber security, leadership, and excellent customer support. They have always been available and have remained focused on the customer's needs. They are professional, knowledgeable, and reliable.

T. Sullivan IT Security Manager

Our Services

We provide Threat and Vulnerability Management. Let us discover exposures and weaknesses of your network systems before attackers do. Our cyber security experts simulate non-intrusive real-world attacks on your organization internet-exposed assets and users. Many cyber-attacks take advantage of basic, often unnoticed security vulnerabilities, such as poor patch management procedures, weak passwords, and configuration flaws. Effective Vulnerability Assessment is a critical step in the effort to protect your data.

Asset Discovery

Find out what’s really in your network. Our network map discover and display connections between devices. We provide a complete view of your network and systems. See your network assets the way hackers do from the Internet.

Vulnerability Assessment

We define and classify your network or system resources, assigning relative levels of importance and identifying potential threats to each resource. We then identify the most serious potential threat first, and provide ways to minimize the consequences if an attack occurs.

Threat Protection

Our extensive Knowledgebase provides information and context about each vulnerability such as threat details, active and potential exploits. We provide fix solutions for each vulnerability.

PCI Compliance

We provided online merchants and member service providers with the most cost-effective compliance certification available for the Payment Card Industry (PCI) DSS.

Web Application Scan

Today's fastest growing risk category is Web Application Vulnerabilities. Let us help you detects Web Application Vulnerabilities we provide detail reports showing exactly what was found and how to fix them.

Customer Support

Internet Security Consulting, Inc. helps you understand the impact that each Cyber Threat could have on your buisness and provide phone or on-site technical support.

Scans

503

Request

64824

Hosts Scanned

37313

Vulnerabilities

5157

Networks

Our Pricing

Network security and vulnerability assesment requirements has been historically costly and difficult to manage. Our pricing plans are customizable and flexible. Feel free to contact us if you need assistance. Let us take the stress out of security consulting. *All plans below require annual contract.

Basic

$25

per month *
  • 6 Scans per year
  • 2 Network MAP
  • 6 Scan Reports
  • 0 Policy Compliancy
  • 0 WAS Scan
  • 0 PCI Scan
  • Technical Support
Contact Us

Standard

$50

per month*
  • 12 Scans per year
  • 4 Network MAP
  • 12 Scan Reports
  • 0 Policy Compliancy
  • 0 WAS Scan
  • 0 PCI Scan
  • Technical Support
Contact Us

Business

$125

per month*
  • 12 Scans per year
  • 8 Network MAP
  • 13 Scan Reports
  • 0 Policy Compliancy
  • 0 WAS Scan
  • 1 PCI Scan
  • Technical Support
Contact Us

Delux

$250

per month*
  • 24 Scans per year
  • 12 Network MAP
  • 27 Scan Reports
  • 1 Policy Compliancy
  • 1 WAS Scan
  • 1 PCI Scan
  • Premium Support
Contact Us

Cyber Security News

Per new data from Symantec’s 2016 Internet Security Threat Report, cyber security attacks are on the rise. But even more alarming is the fact that small businesses have become an even bigger target of these attacks.

img

Vulnerabilities Found in 75% of Websites

Symantec 6:49 AM Cyber Security

Symantec’s report shows that cybercriminals continue to take advantage of vulnerabilities in legitimate websites to infect users. Nearly 75 percent of all legitimate websites have unpatched vulnerabilities, putting us all at risk.

Read More
img

Ransomware. Planning for the inevitable

Microsoft 6:49 AM Cyber Security

Ransomware stops you from using your PC. It holds your PC or files for "ransom". Ransomware is on the rise, and its perpetrators are effectively evading countermeasures

Read More
img

National Cyber Security Awareness Month

NCSA 6:49 AM Cyber Security

Each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. That's what National Cyber Security Awareness Month—observed in October —is all about!

Read More

Consulting

Our consultants have provided concise IT security services along with thousands of scans for clients around the globe some are listed below.

clients Brand
clients Brand
clients Brand
clients Brand
clients Brand
clients Brand
clients Brand
clients Brand

Contact Us

How can we help you? Get answers to questions.

Click on the following link: Email Contact
Contact Us
Contact Us Form
Fields marked with * are mandatory.
To help prevent automated spam, please answer this question

* Using only numbers, what is 10 plus 15?  




Form provided by: FreeContactForm.com


Contact

Asset Discovery

See your network assets the way hackers do from the Internet

Vulnerability Scan

Identifying potential threats to your buisness

PCI Compliance

The most cost-effective compliance certification available

Web App Scan

Let us help you detects Web Application Vulnerabilities