IT Security = Your Security
SpinnerTech experts examine the administrative, technical and physical security controls that a company uses to protect its computing environment. The resulting report provides a solid guideline for designing and implementing cost effective and important information security controls.
Employee Classification Assessment:
SpinnerTech collects data and information from interviews, company documents, network diagrams, etc, in an effort to determine the organization’s approach to information security.
Specify Major Business Assets:
Security consultants analyze company data to identify the client’s critical assets, such as business-critical information, processes, networks and systems. Our experts also analyze the network topology and configurations to identify weaknesses in design or implementation that may impact the security of the company’s network systems.
SpinnerTech studies the organization’s administrative security controls, such as information security policies, standards and procedures, to determine shortfalls.
Facilities Security Analysis:
Security consultants check the company’s facilities and physical access controls, as well as the overall environment, communications and infrastructure support mechanisms, to determine their effectiveness in protecting the company’s computing environment.
Sandboxed Security Test:
A controlled test proves that identified vulnerabilities can be exploited. Using common hacker techniques and a suite of commercial, proprietary and freeware tools, the assessment team tests the company’s internal and external systems. Unlike traditional tests, where actual damage to systems and data often occurs, SpinnerTechs approach minimizes the likelihood of damage. Furthermore, our team quickly advises the client if it detects a critical vulnerability that could seriously impact the company’s corporate functions, so quick action can be taken.
SpinnerTech helps clients understand where they are, where they need to be, and how to get there. Our road map is a comprehensive step by step outline of an organization’s information security vulnerabilities and recommended corrective actions. This enables you to develop a detailed work plan that allows the company to achieve its desired level of security.