{"id":44,"date":"2025-06-21T19:38:54","date_gmt":"2025-06-21T19:38:54","guid":{"rendered":"https:\/\/powerstech.io\/?page_id=44"},"modified":"2026-04-06T19:39:34","modified_gmt":"2026-04-06T19:39:34","slug":"about-us","status":"publish","type":"page","link":"https:\/\/powerstech.io\/?page_id=44","title":{"rendered":"About Us"},"content":{"rendered":"<div class=\"wp-block-group alignfull has-accent-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-669513ed wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-1da03c2a wp-block-columns-is-layout-flex\"><div class=\"wp-block-column is-vertically-aligned-stretch is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div class=\"wp-block-group is-vertical is-content-justification-stretch is-layout-flex wp-container-core-group-is-layout-444d5ee8 wp-block-group-is-layout-flex\" style=\"min-height:100%\"><p class=\"has-heading-font-family has-x-large-font-size\" style=\"line-height:1.2\">At Powers Tech, we\u2019re your trusted partners in bringing battle-tested cybersecurity solutions from the Department of Defense (DoD) to the private sector.<\/p>\n\n<p class=\"has-heading-font-family has-x-large-font-size\" style=\"line-height:1.2\">Whether you need SOC 2 compliance support, penetration testing, incident response planning, or a complete security program, we deliver practical, DoD-grade protection tailored to your business.<\/p>\n\n<p><\/p><\/div><\/div>\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><figure class=\"wp-block-image size-large is-style-rounded is-style-rounded--1\"><img decoding=\"async\" src=\"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\" alt=\"A ramp along a curved wall in the Kiasma Museu, Helsinki, Finland\" style=\"aspect-ratio:3\/4;object-fit:cover\"\/><\/figure><\/div><\/div><\/div><div class=\"wp-block-group alignfull has-accent-5-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-d89aad35 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-1da03c2a wp-block-columns-is-layout-flex\"><div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\"><figure class=\"wp-block-image size-full is-style-rounded wp-duotone-duotone-1 is-style-rounded--2\"><img decoding=\"async\" src=\"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/abstract-geometric-art.webp\" alt=\"White abstract geometric artwork from Dresden, Germany\" style=\"aspect-ratio:4\/3;object-fit:cover\"\/><\/figure><\/div>\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\"><h2 class=\"wp-block-heading\">Our Story<\/h2>\n\n<p>Powers Tech was born from a deep, mission-driven commitment to cybersecurity, forged in the high-stakes environment of the Department of Defense.<\/p>\n\n<p>Inspired to bring that same level of protection to the private sector, we established Powers Tech in Hawaii to make world-class cybersecurity accessible, practical, and affordable for businesses across the islands and beyond.<\/p>\n\n<p>Today, we combine DoD-honed expertise with a local, responsive approach \u2014 helping Hawaii companies and growing organizations nationwide strengthen their defenses, achieve compliance like SOC 2, and stay ahead of evolving threats.<\/p><\/div><\/div><\/div><div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-669513ed wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><div class=\"wp-block-group is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-ce155fab wp-block-group-is-layout-flex\"><h2 class=\"wp-block-heading has-text-align-center has-xx-large-font-size\">Meet our team<\/h2>\n\n<p class=\"has-text-align-center\">&nbsp;Our founders, veterans of DoD cybersecurity operations, experience firsthand the rigor and precision required to safeguard critical systems against sophisticated threats.<\/p><\/div>\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-4935966c wp-block-columns-is-layout-flex\" style=\"padding-right:0;padding-left:0\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-21d4e958 wp-block-group-is-layout-flex\"><p class=\"has-text-align-center has-small-font-size\"><strong>Brian Powers<\/strong><\/p>\n\n<p class=\"has-text-align-center has-small-font-size\">CEO of Powers Tech<\/p><\/div><\/div>\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-63bfd6c1 wp-block-group-is-layout-flex\"><p class=\"has-text-align-center has-small-font-size\"><strong>Diego Uy<\/strong><\/p>\n\n<p class=\"has-text-align-center has-small-font-size\">Chief Technology Officer (CTO)<\/p><\/div><\/div>\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-21d4e958 wp-block-group-is-layout-flex\"><p class=\"has-text-align-center has-small-font-size\"><strong>Robert Powers<\/strong><\/p>\n\n<p class=\"has-text-align-center has-small-font-size\">Chief Financial Officer (CFO)<\/p><\/div><\/div><\/div><\/div><div class=\"wp-block-group alignfull has-base-color has-contrast-background-color has-text-color has-background has-link-color wp-elements-51b9de6eff209e969f7f002a3fa4ebd2 has-global-padding is-layout-constrained wp-container-core-group-is-layout-d89aad35 wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\"><h2 class=\"wp-block-heading alignwide has-base-color has-text-color has-link-color wp-elements-c9b5699bdecff18878afa112249018b5\" style=\"font-size:clamp(4.509rem, 4.509rem + ((1vw - 0.2rem) * 9.152), 10rem);letter-spacing:-0.02em\">FAQs<\/h2>\n\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\"><hr class=\"wp-block-separator has-text-color has-base-color has-alpha-channel-opacity has-base-background-color has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:var(--wp--preset--spacing--30)\"\/>\n\n<h3 class=\"wp-block-heading alignwide has-base-2-color has-text-color has-link-color wp-elements-ba9ded825f1471b084b6f52b4ef7f151\">What services do you offer?<\/h3>\n\n<p class=\"has-contrast-1-color has-text-color has-link-color wp-elements-8b0fa9ec7e84fa346ed6e83a1b6950cc\">We provide a full range of cybersecurity services including SOC 2 compliance support, risk assessments, penetration testing, vulnerability scanning, incident response planning, security policy development, employee awareness training, virtual CISO (vCISO) consulting, and ongoing security program management. Our goal is to help businesses strengthen their defenses while meeting customer and compliance expectations.<\/p>\n\n<hr class=\"wp-block-separator has-text-color has-base-color has-alpha-channel-opacity has-base-background-color has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:var(--wp--preset--spacing--30)\"\/>\n\n<h3 class=\"wp-block-heading alignwide has-base-2-color has-text-color has-link-color wp-elements-17fdcd8c01f0288e6979c76ed13786db\">What is SOC 2 and why should my company consider it?<\/h3>\n\n<p class=\"has-contrast-1-color has-text-color has-link-color wp-elements-ebeddf1377c8f7eae2c673adbdb726fe\">SOC 2 is a trusted framework that shows your customers you have strong controls in place to protect their data. It covers Security, Availability, Confidentiality, Processing Integrity, and Privacy. Many enterprise clients now expect a SOC 2 report before signing contracts, making it a powerful way to build trust and close deals faster.<\/p>\n\n<hr class=\"wp-block-separator has-text-color has-base-color has-alpha-channel-opacity has-base-background-color has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:var(--wp--preset--spacing--30)\"\/>\n\n<h3 class=\"wp-block-heading alignwide has-base-2-color has-text-color has-link-color wp-elements-0e69bd0d14190556667bea90d869dd15\">How can penetration testing help my business?<\/h3>\n\n<p class=\"has-contrast-1-color has-text-color has-link-color wp-elements-75544223d0042512cede8381b30bd04c\">Penetration testing simulates real-world attacks to uncover vulnerabilities before hackers do. It provides clear, actionable recommendations and also serves as strong evidence for compliance efforts like SOC 2. We perform testing on applications, networks, cloud environments, and more.<\/p>\n\n<hr class=\"wp-block-separator has-text-color has-base-color has-alpha-channel-opacity has-base-background-color has-background is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--30);margin-bottom:var(--wp--preset--spacing--30)\"\/>\n\n<h3 class=\"wp-block-heading alignwide has-base-2-color has-text-color has-link-color wp-elements-5af78983f7d137ff5ef6cacdc870ba83\">What does a cybersecurity risk assessment include?<\/h3>\n\n<p class=\"has-contrast-1-color has-text-color has-link-color wp-elements-00ee011ee8f6ae83cf149d82bf9e130a\">We identify your most critical assets, evaluate current threats and vulnerabilities, and deliver a prioritized roadmap with practical recommendations. It helps you focus resources where they matter most and supports long-term security planning.<\/p>\n\n<div style=\"margin-top:var(--wp--preset--spacing--10);margin-bottom:0;height:var(--wp--preset--spacing--10)\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>At Powers Tech, we\u2019re your trusted partners in bringing battle-tested cybersecurity solutions from the Department of Defense (DoD) to the private sector. Whether you need SOC 2 compliance support, penetration testing, incident response planning, or a complete security program, we deliver practical, DoD-grade protection tailored to your business. Our Story Powers Tech was born from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>About Us - powerstech.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/powerstech.io\/?page_id=44\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Us - powerstech.io\" \/>\n<meta property=\"og:description\" content=\"At Powers Tech, we\u2019re your trusted partners in bringing battle-tested cybersecurity solutions from the Department of Defense (DoD) to the private sector. Whether you need SOC 2 compliance support, penetration testing, incident response planning, or a complete security program, we deliver practical, DoD-grade protection tailored to your business. Our Story Powers Tech was born from [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/powerstech.io\/?page_id=44\" \/>\n<meta property=\"og:site_name\" content=\"powerstech.io\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T19:39:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/powerstech.io\/?page_id=44\",\"url\":\"https:\/\/powerstech.io\/?page_id=44\",\"name\":\"About Us - powerstech.io\",\"isPartOf\":{\"@id\":\"https:\/\/powerstech.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/powerstech.io\/?page_id=44#primaryimage\"},\"image\":{\"@id\":\"https:\/\/powerstech.io\/?page_id=44#primaryimage\"},\"thumbnailUrl\":\"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\",\"datePublished\":\"2025-06-21T19:38:54+00:00\",\"dateModified\":\"2026-04-06T19:39:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/powerstech.io\/?page_id=44#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/powerstech.io\/?page_id=44\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/powerstech.io\/?page_id=44#primaryimage\",\"url\":\"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\",\"contentUrl\":\"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/powerstech.io\/?page_id=44#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/powerstech.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/powerstech.io\/#website\",\"url\":\"https:\/\/powerstech.io\/\",\"name\":\"powerstech.io\",\"description\":\"Empowering Secure, Scalable, and Smart Solutions\",\"publisher\":{\"@id\":\"https:\/\/powerstech.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/powerstech.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/powerstech.io\/#organization\",\"name\":\"powerstech.io\",\"url\":\"https:\/\/powerstech.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/powerstech.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/powerstech.io\/wp-content\/uploads\/2025\/04\/powers_tech_logo_transparent_white.png\",\"contentUrl\":\"https:\/\/powerstech.io\/wp-content\/uploads\/2025\/04\/powers_tech_logo_transparent_white.png\",\"width\":512,\"height\":1024,\"caption\":\"powerstech.io\"},\"image\":{\"@id\":\"https:\/\/powerstech.io\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About Us - powerstech.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/powerstech.io\/?page_id=44","og_locale":"en_US","og_type":"article","og_title":"About Us - powerstech.io","og_description":"At Powers Tech, we\u2019re your trusted partners in bringing battle-tested cybersecurity solutions from the Department of Defense (DoD) to the private sector. Whether you need SOC 2 compliance support, penetration testing, incident response planning, or a complete security program, we deliver practical, DoD-grade protection tailored to your business. Our Story Powers Tech was born from [&hellip;]","og_url":"https:\/\/powerstech.io\/?page_id=44","og_site_name":"powerstech.io","article_modified_time":"2026-04-06T19:39:34+00:00","og_image":[{"url":"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/powerstech.io\/?page_id=44","url":"https:\/\/powerstech.io\/?page_id=44","name":"About Us - powerstech.io","isPartOf":{"@id":"https:\/\/powerstech.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/powerstech.io\/?page_id=44#primaryimage"},"image":{"@id":"https:\/\/powerstech.io\/?page_id=44#primaryimage"},"thumbnailUrl":"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp","datePublished":"2025-06-21T19:38:54+00:00","dateModified":"2026-04-06T19:39:34+00:00","breadcrumb":{"@id":"https:\/\/powerstech.io\/?page_id=44#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/powerstech.io\/?page_id=44"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/powerstech.io\/?page_id=44#primaryimage","url":"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp","contentUrl":"https:\/\/powerstech.io\/wp-content\/themes\/twentytwentyfour\/assets\/images\/museum.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/powerstech.io\/?page_id=44#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/powerstech.io\/"},{"@type":"ListItem","position":2,"name":"About Us"}]},{"@type":"WebSite","@id":"https:\/\/powerstech.io\/#website","url":"https:\/\/powerstech.io\/","name":"powerstech.io","description":"Empowering Secure, Scalable, and Smart Solutions","publisher":{"@id":"https:\/\/powerstech.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/powerstech.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/powerstech.io\/#organization","name":"powerstech.io","url":"https:\/\/powerstech.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/powerstech.io\/#\/schema\/logo\/image\/","url":"https:\/\/powerstech.io\/wp-content\/uploads\/2025\/04\/powers_tech_logo_transparent_white.png","contentUrl":"https:\/\/powerstech.io\/wp-content\/uploads\/2025\/04\/powers_tech_logo_transparent_white.png","width":512,"height":1024,"caption":"powerstech.io"},"image":{"@id":"https:\/\/powerstech.io\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/powerstech.io\/index.php?rest_route=\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/powerstech.io\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/powerstech.io\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/powerstech.io\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/powerstech.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=44"}],"version-history":[{"count":4,"href":"https:\/\/powerstech.io\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":71,"href":"https:\/\/powerstech.io\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions\/71"}],"wp:attachment":[{"href":"https:\/\/powerstech.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}