Usage subject to Terms and Conditions

Security Solutions

Cybersecurity Solutions

Defense-in-depth is a defense strategy where an organization protects the different layers (People, Process, and Technology). If one layer is compromised, another security control in another layer should help.

There are 3 general types of Security Controls Administrative, Technical, and Physical. They are described below in more detail.

Management/Administrative Action items include reviewing and analyzing business administrative processes and policies: policies and procedures used by the information security management system (ISMS), including weaknesses found in policies, employee hiring/termination, GRC, etc.

Operational Generally part of Administrative controls. Action items include to review and analyze business processes and functions: the way the business operates may include processes or functions that may not fit in any other category, but may leave the business vulnerable, e.g., personnel, wire transfers processes, working with vendors, customer identification/authentication over the phone, etc.

Technical/Logical Run vulnerability scans on any network, device, connectivity, programs, services, etc., to identify weaknesses on servers, firewalls, computers, mobile devices, websites, network devices, server software, weak passwords, outdated software, shared passwords, etc.

Physical Inspect the physical security of the building, data center, physical access, server room, etc. Physical security includes weaknesses found in door locks, windows, fences, signs, gates, bollards, fire suppression systems, guards, etc.

The control types preceding should help identify: vulnerabilities in the people with whom the organization works internally and externally; the processes the organization and its employees use; and the technology upon which the people and processes rely. Evaluate interactions with people, processes, and technology, and the control types for each asset.

People Includes employees, vendors, partners, suppliers, IT staff, etc.

Processes Includes business and governance processes.

Technology Is used by the people and processes.

Some of the Cybersecurity Solutions include, but are not limited to:

  1. Administrative
    • Security Assessments
    • Compliance Consulting
    • Information Security Program
    • Employee Awareness Training
  2. Technical
    • Advanced Email Spam Filter
    • Email Protection: SPF, DKIM, and DMARC
    • 2FA
    • Endpoint Detection and Response (EDR Next-gen Antivirus)
    • Network DNS Protection
  3. Physical
    • Evaluation of physical vulnerabilities.