888.742.4090

 

Services

Fair Certified Analysts Evolver

[vc_row][vc_column][vc_empty_space height="22px"][vc_column_text] FAIR Certified Analysts give our clients the assurance of higher-level expertise and support through the risk quantification process. [/vc_column_text][vc_empty_space height="22px"][vc_column_text]In support of our rapidly growing cybersecurity and risk management client base, Evolver announces that we have expanded our team of Factor Analysis of Information Risk (FAIR) Certified Analysts.     At Evolver, we work with business leaders to identify business risk elements and then apply the FAIR model to...

Read More
nydfs cyber regulation deadline

[vc_row][vc_column][vc_column_text] Covered entities, including financial and insurance organizations, must comply with the New York Department of Financial Services Cyber Regulation   Cybersecurity regulation is becoming a trend across all sectors, and the first comprehensive regulation has a major deadline at the end of August. The New York Department of Financial Services (NYDFS) Cyber Regulation was announced in September of 2016, and went into effect in March 2017.  Colorado...

Read More
multi-factor authentication rsa securid

[vc_row][vc_column width="3/4"][vc_column_text] Added security for users = improved protection to client data and systems with multi-factor authentication using RSA SecurID   The financial sector has been in the spotlight as of late as new cyber regulation has been passed and more regulation seems to be on the horizon.  The reason for the added emphasis on cybersecurity for the financial sector is that the consumer data is so sensitive, and...

Read More
Monetary Cyber Risk Quantification Healthcare Evolver

[vc_row][vc_column width="2/3"][vc_column_text] Monetary Risk Quantification provides insight on social security number storage and security log aggregation   The healthcare sector is one of the most highly targeted for cyber attack.  With the copious amount of sensitive data sets, like personally identifiable information (PII), medical history, and more, cyber hackers think of healthcare databases as a treasure trove of information.   One of Evolver's healthcare clients turned to us for a monetary...

Read More
evolver executives big data conference

Evolver executives to attend important events in the areas of cybersecurity, medtech, large scale data,  and cyber risk.   DEFCON 25 July 27-30, 2017 Las Vegas, NV   DEF CON is one of the oldest and largest hacker conventions. Many of the attendees include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in anything that can be hacked. Dr. Tim Rudolph, VP of...

Read More

[vc_row][vc_column][vc_column_text] The new playground for cyber hackers is through an organization's social media accounts.  Now is the time to find fake social media profiles and to improve your cybersecurity.     From Facebook, Twitter, LinkedIn, SnapChat, Instagram, and more, hackers are ready to hijack a brand, create fake accounts providing false information, and even deliver executive threats.  Often, fake accounts are set up weeks or months in advance of a...

Read More
ciso support evolver

[vc_row][vc_column][vc_column_text] Executive level CISO expertise for your organization's cybersecurity posture   Every organization today has to be prepared for a cybersecurity attack that could cripple, or even destroy their organization. News stories arise regularly of the most current breach or the loss of operations due to a breach, ransomware, or malware attack. As a result, organizations are spending more of their operational budgets on cybersecurity to address this...

Read More
relativity document review search simplify evolver

[vc_row][vc_column][vc_empty_space height="22px"][vc_single_image image="10585" img_size="full" add_caption="yes" alignment="center" style="vc_box_shadow_3d"][vc_empty_space height="22px"][vc_column_text] How to get the most out of your Relativity searches with speed and accuracy [/vc_column_text][vc_empty_space height="22px"][vc_column_text]Sure your eDiscovery team knows how to create saved searches in kCura’s Relativity but do they fully understand what they are doing and how a few poorly constructed searches can cause performance issues? Read on and discover the technical hows and whys with...

Read More
SSA Small Business Procurement Conference

Evolver sponsors the SSA Small Business Procurement Conference again this year. The conference brings the small business community together with contracting opportunities available within the SSA.   Small businesses will have the opportunity to engage with contract representatives, SSA Employees, primary large contractors, and other agencies in the surrounding area. The conference will also focus on providing updates concerning the SSA’s Socio-Economic Programs and the Mentor-Protégé program. The keynote...

Read More

This quick video shows a simplified path for federal agencies to use when planning to migrate data or applications to the cloud.  The process is further streamlined when using the GSA IT Schedule 70 special Cloud SIN 132-40.   Even before Evolver was awarded this Cloud SIN, we were busy supporting federal agencies’ moves to the cloud. This SIN offering is a more efficient way for agencies...

Read More