Server/Network Design

Managed Service

VoIP SMB Suite

CRM Solutions

Data Backup/Recovery

Information Security

    

Information Security

Organizations frequently must evaluate and select a variety of information technology (IT) security
services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security policy development to intrusion detection support, may be offered by an IT group internal to an organization, or by a growing group of vendors. Organizations can benefit when choices among services and service providers stimulate competition and bring innovation to the marketplace. However, it is difficult and challenging to determine service provider capabilities, measure service reliability and navigate the many complexities involved in security service agreements.
Individuals who are responsible for selecting, implementing, and managing IT security services for an
organization must carefully evaluate their options before selecting resources that will be entrusted to meet their particular IT security program requirements.

The factors to be considered when selecting, implementing, and managing IT security services include:
the type of service arrangement; service provider qualifications, operational requirements and capabilities, experience, and viability; trustworthiness of service provider employees; and the service provider's capability to deliver adequate protection for the organization systems, applications, and information.
These considerations will apply (to varying degrees) to every service depending on the size, type,
complexity, cost, and criticality of the services being considered and the specific needs of the
organization implementing or contracting for the services.

The ten major domains of Information Security are:

  1. Information Security Management;
  2. Security Architecture and Models;
  3. Access Control Systems and Methodology;
  4. Applications and Systems Development;
  5. Operations Security;
  6. Cryptography;
  7. Physical Security;
  8. Telecommunications, Network, and Internet Security;
  9. Business Continuity and Disaster Prevention & Recovery Planning;
  10. Law, Investigations and Ethics.