Security · Prevent · Detect · Recover

Cybersecurity that fits the real threats you face.

Ransomware, phishing, exposed cloud buckets, supply-chain attacks: today’s threats hit small and large organisations alike. Consult One brings senior security engineers and a structured framework to prevent the incidents you can avoid, detect the ones you cannot, and recover quickly when something gets through.

Last updated May 2026 Read time 6 min Amman office +962 77 588 8845

Three jobs: prevent, detect, recover

We do not believe in selling security tools you do not need. Our work always starts with a risk-based view of what your business actually has to lose, then we put the right controls in place at the right cost.

Prevent

Hardening, identity, awareness, vulnerability and patch management.

Detect

SIEM, EDR, log monitoring, anomaly detection, threat hunting.

Recover

Incident response, forensics, restoration, lessons learned.

Assessments and audits

  • Cybersecurity health check. 1–2 week fixed-scope review of identity, endpoints, network, cloud, backups and policies.
  • Penetration testing. External, internal, web application and mobile application testing by certified testers.
  • Cloud security audit. AWS, Azure, GCP configuration review against CIS benchmarks.
  • ISO 27001 readiness. Gap assessment and roadmap to certification.
  • PCI DSS scoping. Where required for cardholder data environments.

Hardening and identity

Most breaches start with a weak identity. We focus on identity as a control plane, then layer endpoint and network protection on top.

  • Microsoft Entra ID and Google Workspace hardening with conditional access.
  • Mandatory MFA, phishing-resistant where possible.
  • Privileged access management (PAM).
  • Endpoint detection and response (EDR) on every device.
  • Email security: DMARC, DKIM, SPF, anti-phishing.
  • Quarterly security awareness training for all staff.

Monitoring and incident response

If something goes wrong, hours matter. Our managed detection and response service watches your logs and endpoints, calls the alerts that matter, and runs the response with a clean playbook.

ServiceWhat it includes
Managed EDR24/7 endpoint detection, response and triage.
SIEM monitoringLog collection, correlation, threat hunting.
Vulnerability managementMonthly scanning, prioritised patch plan.
Incident response retainer4-hour SLA, defined playbooks, post-incident report.
Forensics & litigation supportEvidence preservation, chain of custody, expert reporting.

Compliance and risk

  • ISO/IEC 27001, ISO 27017, ISO 27018 readiness.
  • GDPR and Jordan’s Personal Data Protection Law alignment.
  • PCI DSS scope reduction and assessment support.
  • Sector-specific guidance for finance, healthcare and education.
  • Cyber insurance pre-screen and renewal support.

Frequently asked questions

We are a small business — do we need cybersecurity?

Yes. Attackers automate, and SMEs are now the most common target precisely because they have fewer controls. Our small-business package covers the controls that block 80% of common attacks at a fraction of an enterprise budget.

What happens if we get hit by ransomware?

If you have an incident response retainer with us, call our hotline. We isolate affected systems, contain the spread, work the recovery plan from clean backups, and produce a forensic report. Without a retainer, we still respond — just on a time-and-materials basis with no SLA.

Is a penetration test the same as a vulnerability scan?

No. A vulnerability scan is automated and finds known issues. A penetration test is a manual exercise where a tester tries to actually exploit your systems — chaining issues together the way a real attacker would. Most regulators expect both.

Do you provide a Security Operations Centre (SOC)?

Yes. We run a managed SOC service with 24/7 coverage for clients who require it, with EDR, SIEM and threat hunting bundled together.

Can you help us prepare for ISO 27001?

Yes. We run gap assessments, build the documentation, train staff and stand by you during certification audits. Most clients reach certification in 6–12 months from kick-off.

Start your project with Consult One

Amman, Jordan · +962 77 588 8845 · info@consult-one.com

Start a conversation →All services