top of page

FAQ

  • What products and services does Cyber Uphold offer?
    Cyber Security Penetration Testing Business Startup / White Labeling Support CMMC consulting and audit support Cyber Security Employee Training Cyber Threat Vulnerability Reporting and Remediation Cyber Uphold provides a specialized penetration testing product suite using Kali Linux and range of services designed to protect any business from cyber threats. Our services include helping entrepreneurs utilize our pen testing suite to find vulnerabilities in their local markets and we provide security awareness training, threat intelligence, incident response, security architecture design and CMMC certification support. Cyber Uphold offers a variety of security products and solutions to help you protect your business from cyber attacks. MarcmanSolutions provides post testing software updates, IT managed services, and complete remediation for any vulnerabilities identified during your testing. Engaging with a world class IT managed services provider like Marcman Solutions can speed compliance and correct vulnerabilities fast while improving your team's overall cyber hygiene.
  • What are the costs ?
    All fees are one time charge only, no recurring fees, no required extra fees Cyber Security Penetration Testing Starting at $995 for < 50 endpoints (review required) Business Startup / White Labeling Support Starting at $5000 CMMC consulting and audit support Starting at $5000 Cyber Security Employee Training Starting at $495 per class Cyber Threat Vulnerability Reporting and Remediation (included with Penetration Test) Cyber Uphold maintains simple and easy to understand pricing with no long term contracts or hidden fees.
  • How does Cyber Uphold keep costs low ?
    Cyber Uphold is founder lead and focused on low overhead and the leverage of 20 years of cyber security software that allows us to turn over massive cost savings to small and medium sized businesses. Cyber Uphold has streamlined many of the development activities required for Penetration Testing, created automation, and continuously adds to our suite of products to support businesses and entrepreneurs. We believe that penetration testing is the first and more important step toward securing a business which helps secure our nations infrastructure.
  • How long does a Penetration Test take ?
    Tests can usually be scheduled withing 2 weeks and the onsite portions of the testing are often completed in 1-3 days. Review and completion of the Cyber Security Pen Testing Report generally takes around 2 weeks, but critical vulnerabilities are reported to your team same day.
  • What is tested during a Penetration Test ?
    Cyber Uphold tests your entire network and all endpoints internally and tests your web URL's and any open files available in the cloud externally. Cyber Uphold performs a series of both proprietary and industry standard vulnerability scans using dozens of specialized tools available to the cyber security community.
  • What tools are used during a Penetration Test ?
    Cyber Uphold uses a custom Kali Linux build to perform a full network discover followed by a series of both proprietary and industry standard vulnerability scans. The Metasploit Framework is used in collaboration with Nmap, Wireshark, Netdiscover, Legion, Recon-ng, Aircrack-ng, Maltego and several wifi cracking hardware devices to test your network inside and out using Cyber Upholds custom procedures.
  • When Starting a new Cyber Security Business, can I use my existing equipment ?
    Yes, all of Cyber Uphold's tools, training and procedures are available for download and will run on any computer that supports Virtual Box 7 or later.
  • When Starting a new Cyber Security Business are pre configured computers available ?
    Yes, Cyber Uphold has Dell series 5000 machines pre configured with everything you need. The equipment is sold separately and require your business to be started before they can be ordered. Delivery is usually available with 4 weeks of purchase.
  • Can I participate in the Cyber Security Startup business if I have only minimal technical experience ?
    Yes, Cyber Uphold will support you in hiring technical staff to execute tests on your behalf if you do not wish to run the tests yourself.
  • What is the Metasploit Framework ?
    Cyber Uphold uses this powerful tool that allows you to exploit vulnerabilities, generate payloads, and perform post-exploitation tasks on various platforms and systems. With this tool Cyber Uphold performs real world tests that show exactly how a vulnerability might be exploited.
  • What is Nmap ?
    Cyber Uphold uses Nmap as a network scanner to perform port scanning, service detection, OS fingerprinting, and vulnerability assessment in connection with Netdiscover and Legion to test for the most dangerous open port vulnerabilities.
  • What is Wireshark ?
    Cyber Uphold uses Wireshark as a network protocol analyzer that helps us capture and examine packets, filter traffic, and analyze protocols and encryption to ensure there are no unsafe connections.
  • What is Netdiscover ?
    Cyber Uphold uses Netdiscover as a network address discovering tool. The tool is based on ARP packets and can scan a variety of IP ranges.
  • What is Legion ?
    Cyber Uphold uses Legion to detect potential vulnerabilities in the organization's IP ranges, which can later be tested with more advanced tools like Metasploit.
  • What is Recon-ng
    Cyber Uphold uses Recon-ng as a reconnaissance tool that automates the gathering of information from open sources to look for information that can be used to exploit vulnerabilities during a hack attempt.
  • What is Aircrack-ng
    Cyber Uphold uses the Aircrack-ng suite of tools software tools paired with Alfa Wi-Fi packing sniffing hardware to inspect and crack Wi-Fi networks.
  • What is Maltego ?
    Cyber Uphold uses Maltego for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining. This analysis uncovers susceptible data that may be used by cyber criminals in a vulnerability exploit.
  • What is Snort ?
    Cyber Uphold uses Snort on a custom appliance with custom rule sets to provide your company with the latest technology in network intrusion detection and prevention systems (IDS/IPS). Developed by Cisco, and run internally on all their hardware Snort is best of bread for stopping cyber criminal activities. ​ Cyber Uphold configures and delivers Snort to perform the following: As a packet sniffer like tcpdump or wireshark As a packet logger, which is useful for network traffic debugging and CMMC policies. As a full-blown network intrusion prevention system Snort uses a series of rules customized by Cyber Uphold that help define malicious network activity and uses those rules to find packets that match against them and generates alerts for your team. Cyber Uphold deploys Snort inline to stop these packets at the source.
bottom of page