Cyber & Information Technology

The increase in regulation and best practices for compliance is complicated.  Most medium to small businesses and organizations do not have the resources of time, people, and capital to wade through and solve their cybersecurity gaps.

Imprimis entered the cybersecurity market because, like most companies, we were trying to determine which regulations were required, which solutions were necessary and understand “who” was targeting us as a company.  From this we developed a consulting practice within Imprimis to help others answer the tough problems implementing cybersecurity measures.

Imprimis understands the cybersecurity obstacles companies encounter. Communication between leadership and employees may be faulty, and often times the information technology leadership (i.e. CIO and his staff) comprehends, but cannot not explain the tangible and intangible return on investment to company leadership.  Occasionally the leadership recognizes the significance of security measures but does not incorporate the importance of employee behaviors and the effects on a company's security.  

Imprimis works with energy and utility companies, small to medium businesses, and companies that focus on government contracts to solve their compliance and regulatory requirements.  We have developed several compliance tools that allow senior leadership, the information technology staff, and employees to determine which cyber security requirements are necessary and how to accurately protect information (see our Assessment and Compliance Tools (ACT) on our products page for more information).

In addition to our consulting work, Imprimis’ subsidiary AdroiTec provides IT and network solutions for your business.



  • Policy Assessment
  • Training
  • Risk Assessment
  • Compliance Auditing and Support
  • Remediation Requirements


  • SIEM: LogRhythm
  • FIREWALL: Check Point, pfSense
  • IDS/IPS: Source Fire, Check Point, Snort, Suricata, Bro
  • 2FA: Safenet, Symantec
  • Anti-DDOS: Corero
  • SCADA/ICS Protection? RADiflow
  • CTAM (Under Development)




  • Vulnerability Assessment
  • Penetration Testing
  • Network Design/ Build
  • Network Monitoring
  • Network Administration
  • Business Continuity
  • Incident Management
  • Technical Support
  • Managed Services
  • Colocation
  • Data Center Hosting