ESOURCE Consulting achieves the highest levels of assurance and business value for our clients. We are experienced at identifying and testing potential points of attack after enumerating every live host, open port, and available service. We then identify all vulnerabilities and focus on areas where a compromise would have the greatest impact and highest risk to your business.

We also understand the policies and regulations that drive the need for security, especially for compliance-driven industries. Our analysis is designed not to be disruptive to your organization with minimal impact on staff and business productivity.

Data Discovery and Forensics (Forensics)

ESOURCE’s goal is to ensure that necessary security controls are integrated into the design and implementation of a project.

Data Discovery

  • Legal hold and production requests
  • Medical malpractice
  • CMS/stark audit
  • Insurance request


  • Recovery and preservation
  • Investigation
  • Legal
  • Human Resource
  • Government requests

Utilities and Services (Utilities)

ESOURCE consultants use the tenets of ethical hacking to conduct superior security assessments.

Vulnerability Scanning

  • Automated internal and external scanning
  • Ethical hacking/pen testing
  • Monthly assessment


  • Server and application
  • Website

Assessment and Program Management (Assessments)

A properly completed security assessment should provide documentation outlining any security gaps between an implementation and approved corporate security policies. It is critical to have a comprehensive security plan that meets your organization’s security needs and addresses all regulatory requirements.


  • Policy and procedural audits
  • Data security review
  • HIPAA/HITECH/PCI assessment
  • Meaningful Use compliance review

Program Management

  • Initial program development planning
  • Phased development and project management