Scope of Services
 
  look

Security Architecture Review, Design, and Implementation
Network & Security Architecture Review

Risk Management
Identify Critical Assets & Threats
External & Internal Vulnerability Assessments
External & Internal Penetration Testing
Quarterly Vulnerability Scans
Risk Analysis

Physical Security
Assess Physical Security Controlling Access to Critical Assets

Manage, Monitor, and Audit
Regularly Monitor Effectiveness & Results
Periodic Security Audits


plan

Security Architecture Review, Design, and Implementation
Security Solution Design

Management Strategy and Planning
Business and Security Strategy
Security Planning
Security Roadmap
Management Reporting & Accountability

Physical Security
Recommend physical Security Enhancements

Business Continuity and Disaster Recovery
Design Business Continuity & Disaster Recovery for Critical Assets

Incident Response
Design Incident Response Plans


act

Security Architecture Review, Design, and Implementation
Security Technology Evaluation and Recommendation
Security Solution Implementation

Security Program Development
Policy Assessment, Development, & Implementation
Policy Enforcement
Regulation Compliance
Program Monitoring and Updates

Awareness and Training
Education and Training
Updates & Alert Notifications

Manage, Monitor, and Audit
Managed Firewall & Intr4usion Detection Services
Outsourced Security Administration
Configuration and Patch Management

Business Continuity and Disaster Recovery
Implement and Test Business Continuity & Disaster Recovery for Critical Assets

Incident Response
Implement and Test Incident Response Plans
24 Hour Incident Response Service


repeat