Fortress Information Security is a start-up cyber security company, and we are assembling a creative team to help us overhaul the current homepage (www.fortressinfosec.com).
ACT FAST - THIS OPPORTUNITY WILL NOT LAST LONG. The project is starting by a offering a solicitation to multiple designers who would be interested in submitting a mockup of a creative design approach for updating and refreshing the Fortress website in exchange for compensation. This $200 compensation will be provided to each selected participant whether or not their design mockup is ultimately chosen for full implementation. Each designer should use their mockup to convey a sense of their creative graphical approach for giving Fortress a refreshed high-tech, high-end, “clean/elegant, security-savvy, dynamic, smart” look and feel. For full implementation, Fortress will choose from its mockup submissions and will hire a designer and developer for work on refresh project.
If you are interested in participating, please send Alex Katsaros (email@example.com) a message stating your intention along with references/portfolio of previous work. Mr. Katsaros will let you know quickly if you have been approved for participation. Fortress will most likely choose two candidates from amongst those found through Upwork -- and again, both selected participants will be compensated $200 for their work on the mockup.
If Fortress approves your participation, then the following material applies to you:
Fortress encourages participating designers to review competitors’ websites; Fortress has identified sites that our clients will measure us against; see short list below. Further, each designer may use the content provided below to use with the mockup, or you may use "ipsum loren" text if you prefer (the emphasis in the evaluation is your graphical/visual approach, so the specific words used are not part of the evaluation).
List of competitor websites to reference:
- More examples here: http://cybersecurityventures.com/cybersecurity-500/
Content to use for mockup (optional):
[NAVIGATION ... (e.g., buttons & dropdowns that expose more sub-links presented in a creative way)]
[COOL TAGLINE ... Short, succinct sentence prominently displayed when viewer enters page (see Palantir)]
Fortress Information Security, founded in 2014, is an information security and risk mitigation company redefining traditional risk management through a concert of technology and expert services. Fortress is one of the first companies to develop a comprehensive technology and services platform that helps to solve the security problems that are created with outsourcing and sharing your data with vendors who have potentially weak security.
Fortress’ always-on Risk Identification, Monitoring & Management (RIMM) platform continuously maps and monitors the full surface of an organization’s changing risk landscape. We partner with enterprises to develop a complete risk profile combining 1st/3rd party intelligence and analytics to provide data-driven recommendations that shorten time-to-remediation of security risks.
Fortress Information Security focuses on industries where reputation is critical and regulatory requirements drive the need for security to protect their data including financial services, healthcare, banking/mortgage, insurance, critical infrastructure, retail, membership organizations, and many more.
Third Party Risk Technology
Fortress provides customers with an enterprise security orchestration platform that provides continuous monitoring, visualization, and remediation of cyber security risk of the enterprise and its third party relationships. This is a software-as-a-Service (SaaS) capability delivered to customers as a cloud-based web application. Customers purchase Fortress’ technology on a subscription basis and pay for the service in annual or monthly installments.
Third Party Risk Management Services
Fortress provides information security services for Third Party Risk Management via a tech-enabled business services model that typically supports Fortress’ technology platform and continuous monitoring technology.
Our services fall into three lines: Vulnerability Management, Security Risk Management, and Threat Management.
- Vulnerability Management – services focused on mitigation of vulnerabilities identified from scanning technology, code reviews, and penetration tests
- Security Risk Management – services focused on vendor risk assessments via monitoring or assessments, contract review, and impact assessment
- Threat Management – services focused on predictive analytics, threat intelligence integration, and threat assessment