Please submit a business inquiry online.
-
Reporting and Deliverables
- September 20, 2016
- Posted by: Founder
- Category:
No CommentsExecutive Summary
An appendix with supporting documentation and diagrams
Identification of discovered security vulnerabilities with severity rankings… -
Project Management
- September 20, 2016
- Posted by: Founder
- Category:
Own It Inc provide project management services in conjunction with their Information Security projects or they can work within your project management framework and provide your PM’s with assistance in initial scoping, detailed…
-
Network Assessment
- September 20, 2016
- Posted by: Founder
- Category:
Inventory of all WAN/LAN active network devices
Internet, VPN and overall perimeter review
Firewall and gateway structure -
Server Assessment
- September 20, 2016
- Posted by: Founder
- Category:
Document & Audit internal facing servers, providing software/hardware audits
Determine Patch/Vulnerability status of internal facing servers
Prioritization of servers based on risk -
Desktop Assessment
- September 20, 2016
- Posted by: Founder
- Category:
Document & Audit desktops, providing software/hardware audits
Determine Patch/Vulnerability status of desktops -
Physical Environment Assessment
- September 20, 2016
- Posted by: Founder
- Category:
Review of physical security controls
Perimeter
Parking and vehicular controls
Loading bays -
Facilities Assessment
- September 20, 2016
- Posted by: Founder
- Category:
Power conditioning to include utilities, switch gear, UPS and generator
HVAC systems
Cable Plant (Physical Layer)
Heat, Smoke, Fire & Gas monitoring systems -
External Vulnerability Assessment
- September 20, 2016
- Posted by: Founder
- Category:
Identify external facing servers and carry out vulnerability assessments
Identify external facing network devices and carry out vulnerability assessments -
Network Management Systems Assessment and Consulting
- January 14, 2016
- Posted by: Founder
- Category:
Data Loss Detection/Prevention (DLP)
Network Access Control (NAC)
Web Application Firewall (WAF)
Unified Threat Management (UTM) -
Bonds & Commodities
- January 14, 2016
- Posted by: Founder
- Category:
Bonds and commodities are much more stable than stocks and trades. We allow our clients to invest in the right bonds & commodities.
- 1
- 2
Our clients depend upon the results we are privileged to produce for them. Wayne Miller has contributed directly to these results, helping us honor critical commitments.
