{"id":687,"date":"2021-12-09T15:35:08","date_gmt":"2021-12-09T15:35:08","guid":{"rendered":"https:\/\/enfocomcyber.com\/?page_id=687"},"modified":"2023-10-18T19:51:15","modified_gmt":"2023-10-18T19:51:15","slug":"services","status":"publish","type":"page","link":"https:\/\/enfocomcyber.com\/services\/","title":{"rendered":"Services"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Service experience<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Let us help you make the right change<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Supporting the future<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t\t
We aim to lead research and training with educational institutions to match the business needs of various levels of critical infrastructure companies. This could include developing procedures to test and measure security as well as monitoring large IT infrastructure with automated systems.<\/div>\n\t\t\t\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\"\"<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tScott McPhee<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tSecurity Architect ~ ENFOCOM<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Who we have helped<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Cybersecurity<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Instead of bolting IT Security onto a project ENFOCOM integrates IT Security into all aspects of a project\u2019s life cycle. We can emulate your environment in our cyber range and perform penetration testing to help strengthen your security posture.<\/p>

We use a cyber range<\/strong> which allows us to partner with\u00a0multiple\u00a0industry professionals, collecting a\u00a0diverse set of\u00a0solutions,\u00a0and match you with the\u00a0ones\u00a0best suited\u00a0to\u00a0solve your problems.\u00a0\u00a0We have recently been awarded an opportunity to work with Raytheon and Alberta Innovates to research and develop state-of-the-art cybersecurity solutions.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tCyber Range<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Software Development<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

ENFOCOM employs an effective process model to ensure your project exceeds your expectations. For software development and web application projects, the Capability Maturity Model Integration (CMMI) developed by the Software Engineering Institute is followed to ensure that the final product meets your requirements, is completed on time, and remains within the required budget.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tOur Strategy<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Cloud Solutions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

If you need a cloud application \u2013 accessible via mobile devices, desktop app, or a browser \u2013 our cloud application architects and developers will set you in the right direction. We will help you make the hard decisions that come with developing a cloud-based application for your company, including everything from selecting the right type of cloud, to the choice of platform, to developing new applications or migrating existing applications. We also stick around post-deployment to help you manage your application and infrastructure.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tChoose the cloud<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Terms of Service<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"photo-1554252116-cb46b6d2df78\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tRead Now ><\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

Service experience Let us help you make the right change Supporting the future We aim to lead research and training with educational institutions to match the business needs of various levels of critical infrastructure companies. This could include developing procedures to test and measure security as well as monitoring large IT infrastructure with automated systems.… Read More »Services<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":582,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-pagebuilder-full-width.php","meta":{"content-type":"","neve_meta_sidebar":"full-width","neve_meta_container":"default","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_ti_tpc_template_sync":false,"_ti_tpc_template_id":"","footnotes":""},"yoast_head":"\nServices - ENFOCOM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enfocomcyber.com\/services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services - ENFOCOM\" \/>\n<meta property=\"og:description\" content=\"Service experience Let us help you make the right change Supporting the future We aim to lead research and training with educational institutions to match the business needs of various levels of critical infrastructure companies. This could include developing procedures to test and measure security as well as monitoring large IT infrastructure with automated systems.… Read More »Services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enfocomcyber.com\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"ENFOCOM\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T19:51:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enfocomcyber.com\/services\/\",\"url\":\"https:\/\/enfocomcyber.com\/services\/\",\"name\":\"Services - ENFOCOM\",\"isPartOf\":{\"@id\":\"https:\/\/enfocomcyber.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enfocomcyber.com\/services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enfocomcyber.com\/services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png\",\"datePublished\":\"2021-12-09T15:35:08+00:00\",\"dateModified\":\"2023-10-18T19:51:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enfocomcyber.com\/services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enfocomcyber.com\/services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enfocomcyber.com\/services\/#primaryimage\",\"url\":\"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png\",\"contentUrl\":\"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enfocomcyber.com\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/enfocomcyber.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enfocomcyber.com\/#website\",\"url\":\"https:\/\/enfocomcyber.com\/\",\"name\":\"ENFOCOM\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/enfocomcyber.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enfocomcyber.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enfocomcyber.com\/#organization\",\"name\":\"ENFOCOM\",\"url\":\"https:\/\/enfocomcyber.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enfocomcyber.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Enfocom-logo.png\",\"contentUrl\":\"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Enfocom-logo.png\",\"width\":438,\"height\":115,\"caption\":\"ENFOCOM\"},\"image\":{\"@id\":\"https:\/\/enfocomcyber.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services - ENFOCOM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enfocomcyber.com\/services\/","og_locale":"en_US","og_type":"article","og_title":"Services - ENFOCOM","og_description":"Service experience Let us help you make the right change Supporting the future We aim to lead research and training with educational institutions to match the business needs of various levels of critical infrastructure companies. This could include developing procedures to test and measure security as well as monitoring large IT infrastructure with automated systems.… Read More »Services","og_url":"https:\/\/enfocomcyber.com\/services\/","og_site_name":"ENFOCOM","article_modified_time":"2023-10-18T19:51:15+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/enfocomcyber.com\/services\/","url":"https:\/\/enfocomcyber.com\/services\/","name":"Services - ENFOCOM","isPartOf":{"@id":"https:\/\/enfocomcyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enfocomcyber.com\/services\/#primaryimage"},"image":{"@id":"https:\/\/enfocomcyber.com\/services\/#primaryimage"},"thumbnailUrl":"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png","datePublished":"2021-12-09T15:35:08+00:00","dateModified":"2023-10-18T19:51:15+00:00","breadcrumb":{"@id":"https:\/\/enfocomcyber.com\/services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enfocomcyber.com\/services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enfocomcyber.com\/services\/#primaryimage","url":"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png","contentUrl":"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Worldwide-security.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/enfocomcyber.com\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/enfocomcyber.com\/"},{"@type":"ListItem","position":2,"name":"Services"}]},{"@type":"WebSite","@id":"https:\/\/enfocomcyber.com\/#website","url":"https:\/\/enfocomcyber.com\/","name":"ENFOCOM","description":"","publisher":{"@id":"https:\/\/enfocomcyber.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enfocomcyber.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enfocomcyber.com\/#organization","name":"ENFOCOM","url":"https:\/\/enfocomcyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enfocomcyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Enfocom-logo.png","contentUrl":"https:\/\/enfocomcyber.com\/wp-content\/uploads\/2021\/11\/Enfocom-logo.png","width":438,"height":115,"caption":"ENFOCOM"},"image":{"@id":"https:\/\/enfocomcyber.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/pages\/687"}],"collection":[{"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/comments?post=687"}],"version-history":[{"count":328,"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/pages\/687\/revisions"}],"predecessor-version":[{"id":4182,"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/pages\/687\/revisions\/4182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/media\/582"}],"wp:attachment":[{"href":"https:\/\/enfocomcyber.com\/wp-json\/wp\/v2\/media?parent=687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}