Contact

[mk_page_section bg_image=”https://nightlion.com/wp-content/uploads/2020/06/7.jpg” bg_position=”center center” bg_stretch=”true” video_opacity=”0.1″ min_height=”400″ padding_top=”100″ padding_bottom=”100″ el_class=”herosectionBlock herosectionBlockContactus” sidebar=”sidebar-1″]

[mk_padding_divider size=”100″][mk_fancy_title color=”#ffffff” font_family=”none”]

CONTACT US 314-669-6569

[/mk_fancy_title]

[/mk_page_section][mk_page_section min_height=”160″ padding_top=”120″ padding_bottom=”120″ el_class=”ourclientblock” sidebar=”sidebar-1″]
[mk_fancy_title margin_bottom=”0″ font_family=”none”]

OUR CLIENTS

[/mk_fancy_title][mk_clients count=”-1″]

[/mk_page_section][mk_page_section el_class=”gernalinquriesBlock” sidebar=”sidebar-1″]

General Inquiries

[mk_padding_divider size=”30″][mk_contact_info phone=”314.669.6569″ email=”info@nightlionsecurity.com” company=”Night Lion Security”]

Phone: +1 314-669-6569
Email: info@nightlionsecurity.com
Emergency Support: 1-844-HACK-911

[mk_social_networks size=”medium” style=”simple” margin=”5″ icon_color=”#bdc3c7″ icon_hover_color=”#444444″ facebook=”http://www.facebook.com/nightlionsec” twitter=”http://www.twitter.com/nightlionsec” linkedin=”https://www.linkedin.com/company/night-lion-security” youtube=”http://www.youtube.com/user/NightLionSecurity”][mk_padding_divider size=”30″]

Press / Media Inquiries

[mk_padding_divider size=”30″]

Best Guest Media
pr@nightlionsecurity.com

Send us a message

[mk_padding_divider size=”30″]
[/mk_page_section][mk_page_section bg_image=”https://www.nightlionsecurity.com/wp-content/uploads/2012/06/Anon-bg1.png” bg_color=”#37485c” bg_position=”center center” bg_stretch=”true” min_height=”300″ padding_top=”120″ padding_bottom=”100″ el_class=”customersreactBlock” sidebar=”sidebar-1″]

How would your customers react to a data breach?

98% of top 100 e-commerce sites leave shoppers open to cyber-criminals.
Over 80% of all compromises are the result of exploited web application vulnerabilities.

[/mk_page_section][mk_page_section padding_top=”100″ padding_bottom=”100″ el_class=”what-we-do-section computer-forensics-services-section” sidebar=”sidebar-1″]
[mk_fancy_title color=”#393836″ margin_bottom=”40″ font_family=”none” align=”center” el_class=”section-title-with-icons”]

How We Can Help Protect Your Business

[/mk_fancy_title]

[mk_icon_box icon=”” title=”Penetration Testing” text_size=”20″ font_weight=”600″ read_more_txt=”Learn more” read_more_url=”/services/penetration-testing/” icon_size=”large” icon_color=”#6c7a89″ icon_circle_color=”#313e51″ box_blur=”false”]Network penetration testing will simulate an attack from a hacker’s perspective, allowing us to identify critical flaws in your network that could potentially leave sensitive data open to attacks.[/mk_icon_box]
[mk_icon_box icon=”” title=”Forensics and Digital Investigations” read_more_txt=”Learn more” read_more_url=”/services/computer-forensics/” icon_size=”large” icon_color=”#6c7a89″ icon_circle_color=”#1e8bc3″ box_blur=”false”]Our team of expert forensic analysts are capable of assessing websites, servers, digital media and computer systems. We can provide remote or on-site services tailored to St. Louis business specifications or legal compliance requirements.[/mk_icon_box]
[mk_icon_box icon=”mk-nls-health-journal” title=”Emergency Support” read_more_txt=”Learn more” read_more_url=”/support/” icon_size=”large” icon_color=”#6c7a89″ icon_circle_color=”#1e8bc3″ box_blur=”false”]When a security compromise occurs, businesses need solutions fast. Our Computer Security Incident Response team is available 24/7 to discretely identify points of exposure, eliminate risks and resume business operations as quickly as possible.[/mk_icon_box]
[mk_icon_box icon=”mk-nls-search-file-1″ title=”Security Risk Assessment” read_more_txt=”Learn more” read_more_url=”https://www.nightlionsecurity.com/services/cyber-security-consulting/” icon_size=”large” icon_color=”#6c7a89″ icon_circle_color=”#1e8bc3″ box_blur=”false”]No business is immune to security threats. Our mission is to assess your company’s risk and threat levels, and then develop a comprehensive counter measure and prevention plan to protect your assets.[/mk_icon_box]
[mk_icon_box icon=”mk-nls-nodes-4″ title=”Network Security Audit” read_more_txt=”Learn More” read_more_url=”/services/network-security/” icon_size=”large” icon_color=”#6c7a89″ icon_circle_color=”#1e8bc3″ box_blur=”false”]Identifies and examines network vulnerabilities for both internal and external (Internet facing) systems to determine whether they can be exploited by an attacker to compromise systems or gain access to sensitive information.[/mk_icon_box]
[mk_icon_box icon=”mk-nls-check-windows-1″ title=”Website Security Audit” read_more_txt=”Learn more” read_more_url=”/services/web-security/” icon_size=”large” icon_color=”#6c7a89″ icon_circle_color=”#1e8bc3″ box_blur=”false”]We perform a manual assessment of your web application, testing for SQL injections and OWASP vulnerabilities, as well as, check folders, debug code, leftover source code and resource files to find sensitive information which hackers can exploit to gain unauthorized access to your application.[/mk_icon_box]
[/mk_page_section][mk_page_section bg_color=”#22292f” bg_position=”center center” full_width=”true” padding_top=”40″ padding_bottom=”40″ section_id=”lp-section-cta1″ el_class=”contactBlock” sidebar=”sidebar-1″ first_page=”false” last_page=”false”]

HAVE QUESTIONS? WE ARE READY TO SCHEDULE YOUR FREE CONSULTATION

Call us today:
314-669-6569

[/mk_page_section]