Information Security is who we are and all we do.
Our team is unique. We are the believers that volunteer and run CTFs at BSides, DEF CON, and other security conferences. We are infosec specialists with a broad spectrum of complementary skills. We are developers, security analysts, and forensic investigators.Who are we? Get in touch.
Efficiency - we are all about it.
We design systems and structures. We leverage industry frameworks and best practices. Our methodologies are proven. We build custom tools like nobody’s business.
Proudly Open Source
Open source is world-changing; we’re in for the revolution.
We relentlessly pursue technology that works. We are fiercely vendor independent. We are nobody’s vendor and nobody’s VAR. We promote, use, and contribute to open source constantly. This saves us big money. We help our clients do the same.
Purely No Nonsense
Honest answers and real solutions are our stock and trade.
We are fresh out of fear, uncertainty, and doubt (FUD), smoke and mirrors, magical thinking, snake oil, and silver bullets. We do not throw buckets of money or shiny boxes at information security and we do not recommend that you do either. Instead, we rely on a home-grown mix of real-world experience, industry standards, and custom tools to better leverage your current in-house technology and fill gaps with low-cost, highly effective solutions.
Who We Are
We focus on cybersecurity so that you can focus on your business.
To make enterprise-grade information security available to organizations of all sizes
Our core team is comprised of industry experts ranging from web application testers, network architects, network security engineers, network and host intrusion specialists, penetration testers and programmers. A majority of our cybersecurity work experience comes from the US Department of Defense as well as city, state and federal government entities.
We are committed to the highest ethical standards and absolute integrity. Period.
Trust is our foundation
Recon is trusted by organizations across industries including financial, legal, healthcare, communications, critical infrastructure, and more.
“The personal attention given by Recon's staff in setting up our security is invaluable. It is a complex arena, and you explained the security implications related to our business needs in a way even I could understand them. The systems and procedures you set up for us are exactly what we need to meet our financial industry compliance requirements. Further, the ongoing monitoring and assistance you are providing allows us to concentrate on developing our applications without distractions, but with full assurance that our systems are secure.”Chuck B., Financial Sector - Austin, TX
“In just a short time, my staff is very comfortable with the solutions and monitoring we are receiving. The Recon team gives you the sense that someone is standing guard by helping choose, deploy and monitor security related procedures and tools for our company’s specific needs. They are probably the best kept secret in the industry.”Michael P., Energy Sector - Hattiesburg, MS
“Working with the staff at Recon is always a pleasure. We consider Recon our business partner and one of our main resources for IT security. We believe organizations of any size would benefit from working with them. Their people were great to work with, knowledgeable, and very professional. I would recommend them to anyone in need of IT Security.”Leslie S., Healthcare Sector - Hattiesburg, MS