Customer Company Size
Startup
Region
- America
Country
- United States
Product
- Rapid7 Nexpose
- Rapid7 Metasploit
Tech Stack
- Vulnerability Validation
- Security Assessment Tools
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Customer Satisfaction
- Digital Expertise
- Productivity Improvements
Technology Category
- Cybersecurity & Privacy - Security Compliance
- Cybersecurity & Privacy - Application Security
Applicable Industries
- Professional Service
- Software
Applicable Functions
- Quality Assurance
- Business Operation
Use Cases
- Remote Asset Management
Services
- System Integration
- Cybersecurity Services
About The Customer
Principle Logic, LLC is an Atlanta-based independent information security consulting firm founded by Kevin Beaver. Kevin has over 25 years of experience in IT and specializes in performing independent information security assessments for Fortune 1000 companies, nonprofits, and government agencies. The firm is known for its high level of expertise and efficiency in delivering impactful security assessments. Kevin is also the author of 'Hacking for Dummies,' a best-selling book on information security testing, which is currently in its fourth edition. Principle Logic, LLC prides itself on providing high-quality work and efficient services to secure repeat business.
The Challenge
Most security professionals are strapped for time. In the world of independent consultants, time is even more precious, as their clients prefer engagements to be brief while still yielding business value. Just ask Kevin Beaver, an independent information security consultant with more than 25 years of experience in IT. As the founder of Atlanta-based Principle Logic, LLC, Kevin specializes in performing independent information security assessments for Fortune 1000 companies, nonprofits, and government agencies, among others. For the better part of Kevin’s career, his focus has been on security. “When I graduated high school, computers were the next big thing,” he laughs. “I remember when the concept of people accessing your network first started getting attention.” Fast forward a few years, and he’s now the author of Hacking for Dummies – one of the best-selling books on information security testing that’s currently in its fourth edition.
The Solution
When it comes to Rapid7, Kevin attributes his high level of engagement and positive experiences to two things. The first is the level and quality of customer support: “I was on the phone with a vendor the other day, and at one point in the conversation I thought to myself, ‘this would already have been resolved if I was on the phone with Rapid7.’” He gives top marks for responsiveness and technical expertise, attesting that Rapid7 achieves first-call resolution nearly every time and takes support cases very seriously. The other reason why Kevin is an engaged Rapid7 customer is because of the products themselves. Another valuable aspect is the vulnerability validation component. “The Nexpose-Metasploit integration is very useful,” says Kevin. “I spent years working with various security products, and at the end of the day all I wanted was to know the severity of the vulnerability and whether it was exploitable using Metasploit. It was frustratingly difficult just to get a satisfying answer to such a seemingly simple question.” Given that Kevin strives to perform client engagements as effectively and efficiently as possible, these differentiators are key. “All I have is my knowledge and my time. I need to do high-quality work and I need to be efficient in order to secure repeat business,” he explains. Part of that, of course, is having the proper skills for the task at hand – and, as a security industry veteran, Kevin undeniably has a deep breadth of industry knowledge and expertise to pull from. The other part is having the right tools at your disposal. “I strive to minimize effort and maximize results,” he says. “There can’t be any inefficiencies in the assessment. Rapid7 helps me achieve that goal.”
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
SET Creative Ditches Google Vault for Datto Backupify
When Kienholz first started at SET, the staff was using Microsoft Outlook for email with no form of data backup. It became apparent that something needed to change as the staff was often burdened with trying to recover emails from departed employees. Kienholz transitioned the team to Google’s Gmail and implemented Google Vault for backup purposes. While SET employees quickly adjusted to Gmail, which many use for personal email, the same could not be said for Google Vault. “Unlike most Google products, Vault was not user friendly at all. It’s very hard to search for items. We never really figured out how to do a restore either,” explained Kienholz. Due to SET’s work with high-profile brands, projects often go through many rounds of revisions right down to the eleventh hour. This means that every bit of information - especially data living in project managers’ emails - is crucial to delivering clients a polished design at deadline.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
Arctic Wolf Envelops Teamworks with 24x7 Cybersecurity Protection and Comprehensive Visibility
Teamworks, a leading athlete engagement platform, faced rising cyberthreats and needed enhanced visibility into its network, servers, and laptops. With software developers connecting from all over the world, the company sought to improve its security posture and position itself for future growth. The company had a secure platform but recognized the need for a more proactive solution to identify gaps within its technology infrastructure. Data exfiltration and malicious access were top concerns, prompting the need for a comprehensive security upgrade.
Case Study
Sawback IT and Datto Save Client From a Costly Mistake
Ballistic Echo, a software development house, faced a critical challenge when human error led to the deletion of thousands of lines of unique code. This incident occurred before the code was pushed to source control, resulting in significant loss of time, revenue, and work. The previous file-level backup solution they used was slow and inefficient, making it nearly impossible to manually recreate the lost work. The need for a more reliable and efficient business continuity solution became evident to avoid such disasters in the future.
Case Study
Opal Helps Customers Shine Thanks to Datto
SP Flooring & Design Center faced a ransomware attack that encrypted and locked their files. The attack was initiated through a compromised service account set up by an outside vendor. The ransomware infection was isolated quickly, but there was a concern about the extent of the data at risk. The company had backups in place but was unsure of how much information was compromised. The situation required immediate action to prevent further damage and restore the affected data.
Case Study
Zapier Aggregates Multiple Analytics in a Single Dashboard with the New Relic Platform
Zapier, a company that enables non-technical users to push data between hundreds of web applications, was facing a challenge in automating and provisioning servers for optimal performance. The company's environment consisted of 50 Linux servers on the Amazon Elastic Compute Cloud (EC2), a Django application split across several servers, and a backend consisting of a dynamic number of celery task workers fed by messages published to a RabbitMQ cluster. They also maintained a number of internal web services on nginx in front of Gunicorn and Node.js processes. Redis handled simple key and value stores, with logging handled by Graylog2 and ElasticSearch. However, they realized that no level of automation would be sufficient without an effective monitoring solution in place. They needed a tool that could provide immediate alerts when something was breaking and could be easily implemented into their environment.