Phx-it

Phx-it

Speciality: Network Security Assessment and Incident Response

13 employees
[01] About

Managed IT service provider headquartered in Phoenix, Arizona; now part of Dataprise, a top national managed IT services firm. Offers IT support and cybersecurity services, including penetration testing, with a focus on business support and security.

Managed IT service provider headquartered in Phoenix, Arizona; now part of Dataprise, a top national managed IT services firm. Offers IT support and cybersecurity services, including penetration testing, with a focus on business support and security.
[02] Services
Managed IT Services
Cybersecurity And Incident Response
Penetration Testing
IT Support
Network Infrastructure Design
Project Management
Technical Support.
[03] Certifications
Mspalliance
SSAE18 SOC 2 Type 2
ITIL Foundation
Information Security Foundation (isfs)
Project Management Professional (pmp)
HDI Support Center Manager
Certified Penetration Tester (gpen)
Certified Intrusion Analyst (gcia)
Exploit Researcher And Advanced Penetration Tester (gxpn)
Strategic Planning
Policy
And Leadership (gstrt)
Security Essentials (gsec)
Certified Incident Handler (gcih)
Certified Information Systems Security Professional (cissp)

Origins of CISSP


The Certified Information Systems Security Professional (CISSP) certification was created by the International Information System Security Certification Consortium, known as (ISC)², in 1994. It was developed in response to the growing need for a standardized credential that could validate the knowledge and expertise of information security professionals. The certification was designed to establish a common body of knowledge for the cybersecurity field and provide organizations with a reliable way to identify qualified security practitioners during a time when information security was becoming increasingly critical to business operations.


Industry Value and Importance


The CISSP is widely recognized as one of the most prestigious and valued credentials in the cybersecurity industry. It demonstrates that holders possess comprehensive knowledge across eight security domains, including security architecture, risk management, and software security. Many government agencies, including the U.S. Department of Defense, and Fortune 500 companies either require or strongly prefer CISSP certification for senior security positions. The certification's rigorous requirements—including five years of professional experience and passing a challenging exam—combined with mandatory continuing education, ensure that CISSP holders maintain current, relevant expertise, making it a trusted benchmark for cybersecurity competence worldwide.

Certified Information Systems Manager (cism)
Certified In Risk And Information Systems Controls (crisc)
Six Sigma Yellow Belt
Certified Ethical Hacker (ceh)

Certified Ethical Hacker (CEH) Certification


Origin and Creation


The Certified Ethical Hacker (CEH) certification was created by the International Council of E-Commerce Consultants (EC-Council) in 2003. EC-Council, founded by Jay Bavisi, developed this certification in response to the growing need for standardized training in ethical hacking and penetration testing methodologies. The program was designed to legitimize the practice of "white hat" hacking by establishing a professional framework for security professionals who need to think like malicious hackers in order to better defend their organizations' systems and networks.


Industry Value and Importance


The CEH certification is widely recognized and valued in the cybersecurity industry because it validates a professional's knowledge of current hacking techniques, tools, and methodologies from an attacker's perspective. Many government agencies, including the U.S. Department of Defense, and numerous private sector organizations recognize CEH as meeting their information assurance training requirements. The certification demonstrates that holders understand how to identify vulnerabilities and weaknesses in systems, making them valuable assets for organizations seeking to strengthen their security posture through proactive testing and assessment.

Certificate Of Cloud Security Knowledge (ccsk)
Certified Scrum Master (csm)
Microsoft Gold Partner Certifications
Dell Gold Partner Certifications
Veeam Certified Engineer
Cisco Premier Certified Partner Certifications
Sonicwall Gold Partner Certifications
Vmware Enterprise Solutions Partner Certifications
Citrix Certified Associate
Apple Certified Support Professional
Fortinet NSE 3
Comptia Managed Services Trustmark Provider Certifications
AWS Sysops Administrator
Juniper Networks Certified Internet Associate/specialist/professional
Kaseya Certified Technician/administrator
Sophos Certified Engineer
[05] Notable Clients
  • MidCap Financial Services
  • The Ivymount School
  • ARDX
  • Cardiac Vascular & Thoracic Surgery Associates