Join ACA Aponix for a review of the top 5 concerns identified by our clients and the actions they plan to take to increase their first line of defense against bad actors.
Penetration testing and vulnerability assessments play an important role in identifying network vulnerabilities that could be exploited by a hacker and lead to a breach. We can help your company reduce the chance of a breach.
We provide penetration testing and vulnerability assessment services that can help your company reduce the risk of the significant financial, operational, and reputational losses that can result from a breach. Upon completion of our assessment, we will provide a detailed report with key findings, vulnerabilities, and remediation techniques to enhance your company’s security and regulatory posture.
We perform an automated scan of your environment that detects vulnerabilities that could potentially be used by an attacker to exploit your network.
We will use controlled real-world attack vectors to exploit the vulnerabilities found on your network and identify key weaknesses that could lead to a cyber-attack.
Our credentialed ethical hackers will identify vulnerabilities in your network and attempt to exploit them to see how far a potential attacker could go and what sensitive information could be compromised.
Additional testing services
This test assesses the strength of the physical security controls in your data center, offices, etc.
This test assesses whether your wireless local area network meets security and performance requirements
We use social manipulation techniques to identify the types of information that can be extracted by an attacker prior to an attack.
We validate conditional access policies and multi-factor protections in your Office 365 environment.
Michael Borts has joined the firm as Chief Technology Officer (CTO) to lead ACA’s technology development, vision, and strategy. In his role, he will oversee all product development for ACA’s award-winning ComplianceAlpha® regulatory technology platform and technology enablement at the firm.
The acquisition of Catelas further enhances the holistic surveillance capabilities of ACA’s RegTech platform. Catelas’ patented technology automates the mapping of how people connect and form groups within a firm, isolates collusion risk, and detects high-risk behaviors.
ACA Group (ACA), a leading provider of governance, risk, and compliance (GRC) advisory services and technology solutions, today announced that it has entered into a strategic partnership with the Investment Adviser Association (IAA), a leading organization dedicated to advancing the interests of investment advisers.
The dramatic increase in sophistication and global reach of cyber incidents in 2021 has led cybersecurity to be a growing concern for organizations of all sizes. Join us for the horrifying retelling of the scariest cyber incidents of the past year.
The compliance date for the SEC's New Marketing Rule is November 4, 2022. With 1 year to go, ACA’s team of experts have put together a suggested preparation timeline guide to help firms prepare to implement the changes necessary to comply.