Triaxiom Security | Company Profile - Revenue, Headcount, Tech Stack, Contacts
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Analytics & Tracking
Social & Marketing
Email & Communication
Keywords & Focus Areas
Triaxiom Security
Overview
Acquired by Strata Information Group, Inc. in 2023, this division operates independently within the cybersecurity industry. The team is composed of innovative experts dedicated to staying at the forefront of the rapidly evolving security landscape and committed to providing holistic, quantifiable, and actionable risk analyses that empower clients to make informed, data-driven decisions to protect their most critical assets.
The organization is recognized as a PCI DSS Qualified Security Assessor (QSA) company, is a certified provider of CREST Penetration Testing, and maintains a valid SOC 2 Type II attestation, reflecting a commitment to best-in-class security practices and compliance.
Basic Information
| Industry | information technology & services |
|---|---|
| Founded | 2017 |
| Revenue | 3M |
| Headquarters | 2135 Ayrsley Town Blvd, Charlotte, North Carolina, United States |
| Parent Organization | SIG (Strata Information Group) |
| Alexa Ranking | 790891 |
Contact Details
- Phone: +1 704-951-7123
- Website: triaxiomsecurity.com
- LinkedIn: linkedin.com/company/triaxiom-security
- Twitter: twitter.com/TriaxiomSec
- Facebook: facebook.com/people/Triaxiom-Security/100057430090343/
Key Focus Areas & Initiatives
- Cloud security
- Information security consulting
- Red team engagements
- Cyber risk assessment
- Web application security
- Internal penetration testing
- Strategic consulting
- Network security
- External penetration testing
- Application security
- Web application penetration testing
- Security posture assessments
- Firewall audits
- IoT security evaluations
- Security program reviews
- Certifications: PCI DSS QSA, CREST, SOC 2 Type II
- Security awareness training
- Compliance assessments (e.g., NIST, HIPAA, GDPR)
- Incident response and root cause analysis
- Vulnerability scanning and assessment
- Security program development and customization
Technologies Used
- AI
- Apache
- DigitalOcean
- Facebook Custom Audiences
- Gmail
- Google Apps
- Google Tag Manager
- Hubspot
- Mobile Friendly
- Pardot
- Remote
- Slack
- WordPress.org