Security Consulting
Security consulting is focused on the 3 attributes of a solid security strategy.
- People
Example: Staff need to understand that writing down their password and putting it on a "sticky" note on the monitor is not a good security practice,nor is exchanging their password for a chocolate bar a good practice. - Process
Example: What are the processes being followed to initially register a person on your infrastructure? - Technology
Examples: Firewalls, Intrusion Detection, Intrusion Prevention, Logs
A lot of organizations in the past have taken the position "We have a firewall and we use passwords" therefore their security program is complete. Today, it is not that simple.
Today, as evidenced by the CSI/FBI Computer Crime & Security Survey efforts to protect your proprietary information need to be increased.
We have the skills and experience to meet your goals of securing your organization's information. Listed below are some of the high level capabilities we can offer.
High Level Services:
- Security Policy and procedure development
- Compliance Programs
- Integration with external standards (ISO 17099)
- Information security technology planning
- Secure Remote Access
- Web based authentication mechanisms
- Architectural leadership for security solutions
- Identity Management
- Privileged ID Management
- Role-Based Access Management
- Cryptography solutions
- Public Key Technology
- Secure Communications
- Desktop Security