Cyber Security
  • We protect a business by analyzing its information and network architecture through management of users, access, data, regulatory compliance, and recovery processes. This information is compared against our security reference framework that enables us to identify the gaps. Subsequently, we customize our solutions to client’s unique needs and establish a set of projects to fill those gaps.
    We engage with our clients both in a project-deliverables or resource-based model, depending on the preferences of the client. Our services include the following areas of expertise:

    Cyber-Security Practice Areas

    • Cloud Security
    • Identity and Access Management
    • Regulatory Compliance (NIST, HIPAA, FERPA, FFIEC, Gramm-Leach-Bliley Act, etc.)
    • Security assessment, gaps, and roadmap
    • Data Protection, both on premise and in the cloud

    Client Engagement Process

    • Gather information and requirements from client stakeholders
    • Analyze information for threats and vulnerabilities, and review areas of concern with project owners
    • Scope projects based on a security strategy and plan in phases
    • Deliver projects end to end either with a complete on-site team or a blended on-site and off-site resource model as an option to lower delivery costs
    • Staff client projects with experienced security team members
    • Utilize industry standards based frameworks
    • Adjust to client processes and deliver on customers needs with efficiency and flexibility