Cyber & Information Technology

Imprimis, Inc

The increase in regulation and best practices for compliance is complicated.  Most medium to small businesses and organizations do not have the resources of time, people, and capital to wade through to evaluate and solve their cybersecurity gaps.

Imprimis entered the cybersecurity market because like most companies, we were trying to determine which regulations were required, resolve which solutions were and were not necessary, and understand “who” was targeting us as a company.  From this, we have developed a consulting practice within Imprimis to help others conquer the complex problems of implementing cybersecurity measures.

Imprimis understands the difficulties companies experience.  Often times, the senior leadership understood and employees did not.  The information technology leadership (i.e. CIO and his staff) often understood but could not demonstrate tangible and intangible ROI (return on investment) to company leadership.  Occasionally the leadership understood but did not factor in the importance of employee's behaviors and their effects on a company's security.

Imprimis works with energy and utility companies, small to medium businesses, and companies that focus on government contracts to solve their compliance and regulatory requirements.  We have developed several compliance tools that allow senior leadership, the information technology staff, and employees to determine which cybersecurity requirements are necessary and how to accurately protect their information (see our Assessment and Compliance Tools (ACT) on our products page for more information).

In addition to our consulting work, Imprimis’ subsidiary AdroiTec provides IT and network solutions for your business.



  • Policy Assessment
  • Training
  • Risk Assessment
  • Compliance Auditing and Support
  • Remediation Requirements


  • SIEM: LogRhythm
  • FIREWALL: Check Point, pfSense
  • IDS/IPS: Source Fire, Check Point, Snort, Suricata, Bro
  • 2FA: Safenet, Symantec
  • Anti-DDOS: Corero
  • SCADA/ICS: RADiflow
  • CTAM: (Under Development)




  • Vulnerability Assessment
  • Penetration Testing
  • Network Design/ Build
  • Network Monitoring
  • Network Administration
  • Business Continuity
  • Incident Management
  • Technical Support
  • Managed Services
  • Colocation
  • Data Center Hosting