• home_slide1

    Assess Risk

    Stratum Security is an information security consulting company headquartered in the Washington DC Metro area. Founded in 2005, we provide services to clients world wide. Our list of clients range from large multi-national enterprises to growing start-ups.

    Read More

     
  • home_slide2

    Stop Spear Phishing

    Advanced attacks require proactive measures. ThreatSim allows customers to run their own advanced spear phishing attack simulations including user training on a continuous basis and gain valuable metrics to identify vulnerable endpoints and users. Read More

     
  • home_slide3

    Develop A Program

    We help organizations both large and small develop, improve and mature their security programs.

    Read More

     
  • home_slide4

    Application Security

    Software has become the lifeblood of the modern enterprise. Stratum has assessed software that powers everything from online banking, mobile devices, social networks to factory assembly floors. Trusting your applications requires an objective, critical, and in-depth security review.
    Read More

     
 
  • Services

    High quality information security assessment services.

    Each of Stratum’s offerings assesses the security posture of key technology layers within an organization’s environment. Each engagement is delivered by a team of experienced security professionals that leverage cutting edge technology and a proven methodology.

    Read More
  • ThreatSim

    Automated Spear Phishing Testing Service

    ThreatSim allows users to run attack simulations, on demand, via an easy to use web interface. Simulations mimic how hackers infiltrate your organization through phishing, helps to educate your users on an ongoing basis to detect phishing attacks, and gain threat intelligence on real-life phishing attacks targeting your organization.

    Read More
  • XFIL

    Stratum's Data Exfiltration Tool

    Xfil is a Stratum patented data exfiltration tool that simulates the testing for over 260+ ways that data could leave your network in the event an internal system is compromised. It essentially simulates an APT and automates the testing of your security controls such as egress filtering, DLP and MSP. It presents an interesting approach to bring the simulated attack full circle and provides valuable insight on your ability to detect APTs and any breach that has gotten past your perimeter controls.

    Read More
 

Our Blog

Read up on the latest Stratum Security company news, our take on current information security events, and more.