h3systems.net
Open in
urlscan Pro
2001:470:1:4b8::6
Public Scan
URL:
https://h3systems.net/
Submission: On February 05 via api from US — Scanned from US
Submission: On February 05 via api from US — Scanned from US
Form analysis
1 forms found in the DOMPOST
<form id="contactform" method="post">
<input type="text" id="name" name="name" placeholder="Name" class="col-xs-12">
<div id="nameerror" class="alert-box error col-xs-12"><span>error: </span>Name is required and should be less than 40 characters.</div>
<input type="text" id="email" name="email" placeholder="Email" class="col-xs-12">
<div id="emailerror" class="alert-box error col-xs-12"><span>error: </span>Email is required and should be valid.</div>
<input type="text" id="phone" name="phone" placeholder="Telephone" class="col-xs-12">
<textarea id="comments" value="Message" name="comments" placeholder="Message" class="col-xs-12"></textarea>
<div id="commentserror" class="alert-box error col-xs-12"><span>error: </span>Comments are required and should be less than 950 characters.</div>
<div class="g-recaptcha col-xs-12" data-sitekey="6Lc4hAkTAAAAAB87Wdftb3WZVsD2MMx-gm5SGYBU">
<div style="width: 304px; height: 78px;">
<div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-ssdprvwhg1md" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lc4hAkTAAAAAB87Wdftb3WZVsD2MMx-gm5SGYBU&co=aHR0cHM6Ly9oM3N5c3RlbXMubmV0OjQ0Mw..&hl=en&v=MHBiAvbtvk5Wb2eTZHoP1dUd&size=normal&cb=xoljjtsq3npz"></iframe></div>
<textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
<div id="boterror" class="alert-box error col-xs-12"><span>error: </span>You have to prove that you are not a bot.</div>
<div id="successalert" class="alert-box success col-xs-12"><span>success: </span>We have received your message and will contact you on the next business day.</div>
<input type="submit" id="send" value="SEND" class="col-xs-4">
</form>
Text Content
* Home * About * Services * Duties * Testimonials * Contact Us * IS YOUR BUSINESS COMPLIANT? IF YOU'RE NOT SURE, H3SYSTEMS CAN HELP Services Learn More * H3SYSTEMS A FULL SERVICE CYBER SECURITY CONSULTANCY Services Learn More * WHAT IS A CYBER SECURITY CONSULTANT? YOUR SECURITY SME (SUBJECT MATTER EXPERT) AND BUSINESS ANALYST Services Learn More * IS YOUR BUSINESS COMPLIANT? IF YOU'RE NOT SURE, H3SYSTEMS CAN HELP Services Learn More * H3SYSTEMS A FULL SERVICE CYBER SECURITY CONSULTANCY Services Learn More 1 2 3 PrevNext Start Stop WHO WE ARE H3Systems was founded by Don Hartung in 2001. Don has 25+ years in Security and Technology having worked in Law Enforcement, Counter Intelligence and Information Security. He has worked for startups, small, medium, and large multinational companies (HackerSafe, Clorox, OddzOn, McAfee, Qualys, and FireEye) in various technology and security roles. He was the Facility Security Officer (FSO), for two defense contractors supervising and directing security measures related to classified programs in the organizations in conjunction with and across the business units. TECHNOLOGY SERVICES H3Systems has been in the technology space for 25 years and draws from a wide range of experience in the following: * PCs * MACs * Network Security * Wi-Fi Audits * Compliance CCPA, PCI, HIPAA, SOX, ISO 20071, FISMA, NIST 800-53 & 800-171, GLBA. * Security Awareness * Mitigation and Remediation back to the top WHAT IS CYBERSECURITY Cyber security is the state or process of protecting and recovering networks, devices, and programs from any type of cyberattack. They will assist the Security, IT and Business Units through the deployment of strategic and holistic approaches in dealing with specific business issues. This is done by carefully assessing risks related to the organizations reputation, information, assets and all people involved. This is crucial especially for businesses that are looking at long-term sustainability and expansion. Some areas that Cybersecurity consultant may be involved with include: * Establishing and evangelizing the security vision * Defining security strategy and goals * Detemining the level of acceptable risk * Defining and implementing security and compliance governance * Coordinating compliance activities and communicating with regulatory groups * Creating, publishing and maintaining security policies back to the top TESTIMONIALS * Maddi Dreier Executive Assistant at SugarCRM > "It is with great pleasure to recommend Don Hartung, his work performance > as FSO / Security Manager in McAfee took the security at the Headquarters > office to a higher level. His integrity, work ethics, and honest approach > to any situation that arises make Don an extremely positive asset to any > company. I would be more than happy to work with him again!" * Mark Tonnesen CIO, CSO, and VP Operations at Neustar, Inc. > "Don is an extremely positive person and customer-oriented. He is amazingly > responsive and operates in the most professional manner. Don is very > business savvy and works tirelessly in conjuction with all levels of > executive management. I really hope we work again in the future." * J.J. "Mick" Mickelson Director, Global Cyber Assurance, Cyber Security at Hewlett-Packard > "Don is a very motivated, dependable security professional with a deep > seated dedication to his job... his knowledge and attitude has impressed > everyone he works with and he has gained the respect of employees and > management alike. I would very much like to have Don work for me again if > the opportunity arose." * Maddi Dreier Executive Assistant at SugarCRM > "It is with great pleasure to recommend Don Hartung, his work performance > as FSO / Security Manager in McAfee took the security at the Headquarters > office to a higher level. His integrity, work ethics, and honest approach > to any situation that arises make Don an extremely positive asset to any > company. I would be more than happy to work with him again!" * Mark Tonnesen CIO, CSO, and VP Operations at Neustar, Inc. > "Don is an extremely positive person and customer-oriented. He is amazingly > responsive and operates in the most professional manner. Don is very > business savvy and works tirelessly in conjuction with all levels of > executive management. I really hope we work again in the future." 1 2 3 PrevNext Start Stop CONTACT US error: Name is required and should be less than 40 characters. error: Email is required and should be valid. error: Comments are required and should be less than 950 characters. error: You have to prove that you are not a bot. success: We have received your message and will contact you on the next business day. * Napa, CA 94559 * (707) 390-6100 * don@h3systems.com Connect with us... Don has 25+ years in Security and Technology having worked in Law Enforcement, Counter Intelligence and Security. He has worked for startups, small, medium, and large multinational companies HackerSafe, Clorox, OddzOn, McAfee, Qualys, and FireEye in various technology and security roles. NAVIGATION * Home * Services * References * About * Contact Us * Terms & Conditions * Privacy Policy CONTACT US * Napa, CA 94559 * don@h3systems.com * (707)390-6100 Terms and Conditions · Privacy © Copyright 2023 H3Systems.com Not seeing a Scroll to Top Button? Go to our FAQ page for more info.