Recon InfoSec


All security telemetry is transmitted to our SIEM via TLS encryption


Data transmitted to our SIEM is encrypted-at-rest with a data key using the industry-standard AES-256 algorithm

MFA Enforcement

Multi-factor authentication enforced company-wide for all systems and applications

Hardware Tokens

Hardware security-token enforced for own analysts on all SOC platform tools processing customer data

Penetration Testing

We endure annual penetration testing to ensure we are consistently meeting the highest security posture


A blandit nunc suspendisse eleifend elit adipiscing a quis fames suspendisse at a potenti.

Zero Trust Architecture

We leverage leading Zero Trust concepts like those outlined in Google’s BeyondCorp initiative and strive to be on the cutting edge of enterprise security so we can advise our customers accordingly.

© 2022 Recon InfoSec, Inc. All rights reserved. | Terms of Use | Privacy Policy
Created with Open Source by Freehive