What is H2H

H2H Technology is a consulting and professional services firm focused on delivering information security solutions to our customers. Whether your organization requires expertise on system integration or advisory services H2H is your trusted resource.

At H2H we utilize the industry leading technologies to plan, implement and manage our customer’s security infrastructure. Our consultants are certified experts with the average consultant having at least seven years of industry experience working in enterprise environments.

Our expertise has been depended upon to secure the infrastructure and most importantly the information of several fortune 500 companies. Our clients can be found in all industries and verticals.

Our History

H2H Technology was launched in 2010 and has quickly become one of RSA Security, LLC key go to partners. In addition to delivering partner security solutions, H2H also provides expert nationwide corporate security solutions.

Enterprise Security Realized is H2H’s unique tag line based on our belief in a holistic security program for your Enterprise. To ensure success, our security engagements always begin with a working partnership with our customers where we identify requirements and then develop a unique security road map with deliverables to ensure success.

H2H was founded by Cortez Lake, an active security member with over 15 years of infrastructure, risk, and audit experience. In fact, H2H’s entire consulting and engineering team holds on average 10 years of Information Security experience. In addition they have obtained many certifications including, but not limited to, CISSP, GCIH, CEH, Security+ and CISM.

Please contact us to see how we can assist with your security or compliance requirements.

Our Services

Breach Readiness

The breach readiness assessment evaluates the preparedness of an organization for the likelihood of a data loss incident.

Maturity and Target Capabilities Assessment

The maturity and target capabilities assessment measures the current state of the organization in common functional areas with recommendations and a road map for improvement.

Security Log Auditing

The security log auditing service evaluates the event logs being collected at an organization along with the logging levels and recommendations as it relates to compliance and threat detection.

Design and Implementation

The design and implementation service includes the architecture guidance and installation of an enterprise technology along with a functional overview of the solution.

System Health Check

The system health check service is a performance optimization engagement consisting of patching, tuning, and data cleanup.

Compliance Enablement

The compliance enablement service comprises of a readiness assessment and recommendations to meet PCI, HIPAA, or SOX compliance requirements.

Investigation and Discovery

The investigation and discovery service is a deep data analysis of captured network traffic searching for anomalies and threats.

Our Testimonials

H2H has done a great job. Due to the customer’s operational tempo, we were able to disengage all other consultants and let H2H run with it, which speaks highly of their abilities and expertise.

We are confident that our objectives have been met. H2H did an outstanding job. They have highly skilled, dependable and dedicated resources. The success of our project had a great deal to do with their involvement. I look forward to working with them again in the future.

I just wanted to let you know we are VERY happy with the consulting services your organization has provided. They made it easy to sign-off on the engagement. Way to go!

Contact H2H

H2H Technology
2511 W. Schaumburg Road
Suite 120
Schaumburg, IL 60194
Phone: (312) 489-8578
Email: info@h2htech.com


Your Name (required)

Your Email (required)


Your Message (required)