|
|
|
|
Information Security Consulting (ISCP)
|
|
|
Security Assessment - Security Polices, Procedures and Guidelines
|
|
|
Security Assessment Service
Analyze network security performance
With the potential for network threats and attacks by remote hackers, the need for internal security protection can easily be overlooked. Properly implementing network security controls, both policies and technology, are needed to prevent intentional attacks, to minimize unintentional mistakes, and to prevent unnecessary exposure of information assets.
The Valiant Security Assessment Service addresses all aspects of security in a wireless infrastructure by analyzing your existing network security program and providing a comprehensive assessment outlining security gaps and potential risks. Valiant security consultants evaluate your entire network security program, systems, and protocols and applications, and assess the technology and element security to help ensure it can protect your network from the latest threats. |
|
 |
Features of the Security Assessment include:
-
Review of the overall enterprise architecture to determine its ability to protect against external influences gaining access to trusted internal networks and systems
-
Analysis of technical configurations and select networking entities to uncover undesirable security exposures
-
Assessment of the internal network design and architecture to determine the level of exposure of information assets to internal resources
-
Comprehensive evaluation of security management controls and processes, including review of existing policies and procedures, organizations, information classification practices, physical security, network management technology and processes, and access.
|
Security Policies & Procedures
Create a comprehensive, custom security policy
Although an organization's information assets are specific to business functions and strategies, they may be contained within broad categories such as those that need contractual and legislative compliance, explicit access controls, virus prevention, critical to business, or varying levels of sensitivity.
The Valiant Security Policy & Procedures service provides an investigation of your requirements for information security, associated priorities, and business objectives to create a custom security policy to clearly demonstrate management's commitment to an enterprise security program to employees, customers, partners, and shareholders. Valiant Security consultants team with your staff to develop a detailed work plan and meet on an ongoing basis to help ensure all work is performed to your satisfaction. |
|
 |
To ensure the policy meets business needs, Valiant Security consultants draw from past experience and best practices selected from industry standards for commercial environments in areas such as organization, personnel, physical controls, asset clarification and control, and network and computer management.
With Valiant Security Policy & Procedures service, our Security consultants will interview your key business and IT managers to develop a corporate security policy that will contain, at a minimum:
-
Definition of information security with a clear statement of management's intentions and expectations of security processes
-
Explanation of security requirements, including:
- Compliance with legislative and contractual requirements
- Security education, virus prevention and detection, and business continuity planning
- Incident response requirements and processes
|
- Acceptable uses and management procedure
- Description of security program participant roles and responsibilities
- Process for maintaining the policy document and established security programs
|
|
|
|
|
|
|
 |