Services

Our clients include leading internet service providers, utility companies, medical device companies, consumer product manufacturers, law firms, and investment firms. Every River Loop Security engagement is tailored to meet our clients’ unique needs, and every project begins with a thorough understanding of clients’ security objectives.

We offer advisory input, deep technical assessment, and co-development, depending on client needs’ and the lifecycle of their products. We encourage clients to engage our services early in their product development cycle so that we can assist in designing a secure system from the start; we understand, however, that early engagement is not always possible and are available for consultation at any stage of development or deployment.

Our team adheres to ethical codes of conduct to maintain the confidentiality, integrity, and availability of your systems. Several of our experts maintain industry certifications including Certified Intrusion Analysts and Certified Incident Handlers. We take client confidentiality very seriously and make a clear distinction between consulting services and open source community contributions.

We excel at solving problems, ranging from tactical to strategic, and are available for rapid turnaround consultations, system evaluations, or comprehensive security strategies.

Contact us so we can discuss your needs.

Hardware assessment and penetration testing

We perform black or white-box analysis of hardware systems, ranging from embedded systems to consumer products to large scale infrastructure. Our engineers work closely with our security experts to examine each part of clients’ systems down to the circuit board, and we assess threat vectors to the firmware. We often build custom tools to extract code, keys, and more, based on client needs.

Wireless reverse engineering

We perform in-depth wireless security assessments including radio frequency (RF) protocol reverse engineering and wireless penetration testing. We also provide consultation and design services to assist our clients in developing secure wireless systems. Our RF engineers, reverse engineers, and cryptographers work together to deliver complete solutions.

Software and system penetration testing

We apply in-depth knowledge of real-world threats to identify and mitigate vulnerabilities that could be used by attackers to breach the security of clients’ software, networks, and other systems. We work closely with our clients to formulate appropriate test procedures, which could include checking for application vulnerabilities, social engineering, or physical penetration testing.

Network scanning, including device enumeration and vulnerability analysis

We perform discovery of an organization’s true internet or intranet facing exposure, and determine what platform or application vulnerabilities exist.

Cryptography design and review

We recommend appropriate cryptographic protocols for your use cases, and review cryptographic designs and algorithm implementations to assess and improve their security.

Custom security tools, including code and/or hardware development

We have experience developing custom software solutions on platform and embedded devices. We have in-house PCB design and assembly capabilities for custom hardware to interface with unique target devices.

Security risk assessment

Our experts review your company’s business needs and risk profile to recommend proven techniques, industry best practices, and a blend of technologies to manage information security risks.

Disclosure response consulting

If your company or an affiliate experiences a reported product vulnerability, our team can assist to help validate findings, compare your solution with best practices, and offer expert advice to your response team.