Mayfield

Logo

Consulting

Security Architect as a Service
Security Architect as a Service

Taking a structured approach to security will provide long term resiliency against cyberattacks. Important services to consider:

  • Cyber Maturity Roadmap
  • Policy + Procedure Development
  • vCISO
  • Training and Education
  • Business Continuity and Disaster Recovery Planning

Security Assessments
Security Assessments

Assessing your current state to see where you stand.

  • NIST CSF
  • Security Architecture Review
  • Network Virtualization
  • Cloud Security Assessment

Security Design
Security Design

As cyber threat landscape is constantly evolving, so do the organizations security environments. At Mayfield, we are constantly working on the ground and getting a firsthand view of breached environments. There are good security concepts and then there are practical security practices applicable to each environment.

  • Zero Trust Network Architecture development
  • Micro-Segmentation
  • Perimeter Security
  • Endpoint Protection
  • Cloud Security
  • SASE

Network and Virtualization
Network and Virtualization

Securing and Hardening the network and virtualization tier on all layers.

  • Network Design and Configuration
  • NSX-T Design and Configuration
  • ACI Design and Configuration
  • Dynamic Routing Protocols
  • SDWAN solution design and deployment

Certified Team

At Mayfield, our formula of success has always been dedicated resources that are subject matter experts in individual technologies rather than individuals focusing on every technology/vendor. We take the best from our bench and deliver the best collective service to our clients.

Certified Resources in:
logo
logo
logo
logo
logo
logo
logo
logo
logo
logo

And many more

Minimum 7+ years of experience

Practical experience with Various environments within Fortune 1000

Vendor and Industry Best Practice implementations

Vulnerability Assessments

A vulnerability assessment is a thorough evaluation of the levels of cybersecurity hygiene within your environment. It is used to identify existing and potential threats in the software throughout your organization’s systems and networks resulting from unpatched and exploitable vulnerabilities, giving the organization the opportunity to remediate these deficiencies before they are discovered by a bad actor.

Vulnerability Assessments

Contact Us

Canada
2 Robert Speck Pkwy, 750,
Mississauga, ON
L4Z 1H8

10665 Jasper Avenue, 14th Floor
Edmonton, AB
T5J 3S9

USA
1600 Golf Road,
Rolling Meadows
60008

Use the contact form to reach us out for any questions or inquiries!

For any immediate requirements, feel free to call one of our experts directly (844) 629-7321