Manage and approve change in IT hardware, software, and documentation.
We employ a variety of data encryption technologies designed to secure your confidential organizational data as well as ePHI (electronic Patient Health Information). These methods range from full disk to file level encryption. As with all of our solutions we will choose the methodology to fit your unique requirements.
Our security personnel will monitor, identify, and respond to issues regarding both external and internal threats.
After assessment of your infrastructure we will recommend and install the appropriate security appliance enabling protection of your resources as well as secure access from remote workers. Once installed management of this device will be accomplished via our managed services solution.
Our Intrusion Detection/Prevention systems focus on identifying possible threats security incidents, logging information about said incidents, attempting to stop them and reporting them to our security administrators. This Intrusion Detection/Prevention system is also used for other purposes such as identifying problems with security policies and deterring individuals from violating these policies. It is also used to document existing threats.
We will install, as well as monitor the above security solutions to protect against software vulnerabilities, malicious code threats, and unwanted software. Definitions for these solutions are continually updated to ensure protection.
With the number of security threats and vulnerabilities increasing at alarming rates software vendors are also releasing hot fixes and updates more frequently. Our OnGuard managed security service will identify missing patches and service packs on vulnerable systems and deploy them remotely with no intervention on your part required.
We will configure your workstation to log off after a predefined period of inactivity, or provide you with an optional solution which logs off when you leave the proximity of your system. To log back on simply reauthenticate via fingerprint scanner and resume your session exactly where you left off.
This enhanced authentication method requires the user to both know their logon credentials (password) as well as possess an additional authenticator such as a smart card or USB token.
In conjunction with our risk analysis for your network we will perform an in-depth scan for security weaknesses utilizing a database containing known vulnerabilities as well as being continually updated for the latest threats.