Vulnerability Scanning


Vulnerability scanning is the systematic identification, analysis and reporting of technical security vulnerabilities that unauthorized parties and individuals may use to exploit and threaten the confidentiality, integrity and availability of business and technical data and information. External vulnerability scanning specifically examines an organization’s security profile from the perspective of an outsider or someone who does not have access to systems and networks behind the organization’s external security perimeter. Your external IPs be scanned once a year, once a quarter or monthly.

Read More

Mobile Application Scanning


Mobile platforms by default make certain promises about their environment. Development teams should not rely on these promises to protect critical data and code. Architecture review and threat modeling process will includes assessing and documenting security risks in the context of use cases, services, roles and functions unique to your application. The threat modeling is performed in collaboration with your business, engineering, operations and corporate security teams to understand and create the system’s security objectives, threat profile, attacks, vulnerabilities and countermeasures from design to deployment.

Read More

Darkweb Credential Monitoring


We provide the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen password. We continuously monitor the dark web for stolen databases and identities, and maintains the encrypted data in our proprietary database. When integrated with an IAM solution, we can provide superior visibility into user-centric risk and the ability to automate appropriate corrective actions, preventing the abuse of compromised credentials.

Read More
Product Solutions Online Training Portal

Online Training Portal

KRAA Security provides a cost effective online computer based training (CBT) solution that trains your employees on standard or custom built courses that can also track employee attendance and policy acceptance.

KRAA Security – Online Training Portal Demo – 052011 (3:45 video demonstration of features of the Online Training Portal)

Standard Courses

  • Appropriate Use of Social Networks (Using Social Networks Safely)
  • Avoiding Identity Theft
  • Dealing with Documents
  • Dealing With Spyware
  • Defend Yourself Against Viruses
  • Fax Security
  • Fight Phishing
  • Good Password Practice
  • HIPAA Security for Healthcare Staff
  • Information Retention and Destruction
  • Information Security and Mobile Devices
  • Information Security Refresher
  • Introduction to Information Security
  • Safe Surfing
  • Secure Use of Email
  • Securing Your Computer – Part 1
  • Securing Your Computer – Part 2
  • Social Engineering
  • Password Test
  • Physical Security
  • Understanding Copyright
  • Understanding The HIPAA Privacy Rule
  • Using E-mail
  • When You’re Out of the Office
Sample Standard Policies
  • Acceptable Use Policy
  • Email Policy
  • Facebook Social Media Policy
  • Non-Discrimination Policy
  • Password Policy
  • Social Media Policy Guideline
  • Social Media Risk Management Guidelines
For an on-line demonstration and more information on all of our standard courses and our customization options please contact us.