Security is
Non-Negotiable

Every 11 seconds world-wide there is a ransomware attempt. Don't let your business become the next statistic. Let our team enable your business to function without the fear of breach, ransom and/or loss of business due to cyber-crime.

Get a Special Price on a
Defensive Controls Analysis.

Give us your contact information and we can schedule a time convenient for you to discuss what a Defensive Controls Analysis can do for your business IT security posture.

Sign up for our Cyber Alerts

What is the Value of a Defensive Controls Analysis?

A Defensive Controls Analysis (DCA) addresses the administrative mechanisms (such as policies, procedures, standards, guidelines, laws, and regulations) that are used to guide the execution of security within an organization. In short, a DCA provides a clear roadmap for execution of security in the business.

How It Works

Transformyx offers a Defensive Controls Analysis (DCA) based on known security frameworks within the financial, healthcare, educational, and government or private sectors. A Defensive Controls Analysis can prepare organizations for an upcoming assessment, compliance audit, or a formal annual third-party review. Transformyx has a robust testing methodology using the latest techniques, tools, and multiple security professionals to assess your security posture. 


  • Phase 1 – Select a compliance framework to determine relevant security control requirements.
  • Phase 2 – Review the assumed state of the current security controls as presented by the client.
  • Phase 3 – Conduct an assessment. 
  • Phase 4 – Identify gaps with the known state, based on observation and testing.
  • Phase 5 – Verify gaps by Security Expert.
  • Phase 6 – Create Gap Analysis Report.
  • Phase 7 – Create a Corrective Action Plan (CAP) and present it to the client, along with the Gap Analysis/Findings report.

Defensive Controls Analysis

Risk Assessments

Information Protection Programs

Managed Security Services

Schedule a Complimentary Defensive Controls Analysis Meeting Today.

Sign up for our Cyber Alerts