About Xervant Cyber Security

Our Story

Xervant Cyber Security helps businesses protect their data and reduce their exposure to information security related risks by providing high-quality security assessment services.

Our commitment to customer service and relentless pursuit of providing excellence has helped to guide us since our humble beginnings in 2011.

Some of the core values that drive us are:

  • We believe in building relationships
  • We believe people are important
  • We believe doing the right thing is always right
  • We believe good security should be within everyone's reach


  • Nationwide Information Security Serviceswe provide nationwide information security coverage to help keep your systems safe regardless of location
  • Certified Information Security Professionalsour information security experts are seasoned professionals with years of experience
  • Fixed Project Pricing With No Surpriseswe offer fixed, no-risk pricing so that you know exactly how much it is going to cost you before we even begin
  • Simple No Hassle Quoting Processjust let us know what you need and we will get you a quote prepared right away
  • Manual Inspection By An InfoSec Expertnothing is better at discovering complex vulnerabilities than manual inspection by an information security expert
  • 100% Happiness Guaranteewe believe in building long-term relationships with you, our customer, so if you are not happy with our services, we will do whatever it takes to make you happy

Customer Comments

Please allow me to take this opportunity to recommend Xervant Cyber Security. We engaged them to assess the security posture of our content management system and other system components, and we were very pleased with their level of professionalism and expertise. They were very knowledgeable and exhibited a high attention to detail in every aspect of the engagement. In short, they were a pleasure to work with and I would strongly recommend them to anyone needing information security related services.
CEO, Web Development/SEO Company

Aside from being an expert in his field and affordable, Craig is one of the nicest people I know. He has spent many hours explaining the complexity of our software and trying to help us understand how it all works. Although I have never met Craig face to face I know that I can trust him to provide a fair and knowledgeable response to my questions and/or projects.
President, Consumer Services Company

It is my pleasure to take this opportunity to highly recommend Craig Hatley and Xervant for any IT security needs. We have called upon Xervant several times during the past year to complete independent security scans to validate the IT security for both private and government IT infrastructures. During this time, Craig has consistently been able to quickly identify any security issues, give us a report on the deficiencies, and make recommendations to remedy the flaws. On occasion, Xervant also assists us with the proper protocols to ensure we engineered an efficient, secure network. In addition, Xervant has been exceedingly fair with pricing and has exceeded expectations on several occasions. Craig gives top-quality services, is always trustworthy and is willing to go the extra mile to ensure a job well done.
Owner, IT Support Company

Our Approach

All of our security assessment services are designed to improve the real-world security posture of your systems, infrastructure, and people. We accomplish this goal by evaluating your organization’s security from the perspective of a would-be attacker. Most of our services are performed remotely which contributes to our lean business model and in turn, much better pricing for you.

Although we automate certain aspects of our security assessments, we believe that the best way to truly evaluate security protocol effectiveness is a manual inspection by a highly skilled information security professional. Our information security experts utilize an array of industry standard tools and specialized proprietary tools which we have developed in-house to help expose the potential vulnerabilities in your system.

Our blended security assessment techniques provide you with the best of both worlds in terms of identifying potential vulnerabilities and exploiting them in a safe and controlled manner. Of course vulnerabilities which have a high risk of disrupting services would not be exploited unless specifically requested as a part of the scope for a given assessment project.

Craig Hatley
Craig Hatley, CEO

From the CEO

Thank you for visiting our web site. We realize that there are many options for you to consider as you work towards evaluating and/or improving the security of your organization. As such, we want you to know that we are here to help you in any way that we can.

We believe that the best way to measure the real-world security posture of your organization is to perform a real-world security assessment which mimics an actual attack, but without the associated risks. We understand that it can be unsettling to subject your organization to this type of scrutiny, so we have taken great strides to help simplify the process and minimize the risks. In an effort to be fully transparent, you will notice that most of our pricing is available on our site and because we feel that good security should be within everyone's reach, we operate a very lean business model allowing us to offer great pricing while still providing top quality services.

We welcome your comments or questions and look forward to the opportunity to serve you.