Our technical, business and compliance consultants install electronic surveillance equipment to collect network, systems traffic and data metrics for review and analysis.  All information is reviewed to gather a better understanding of your environment including your strengths and weaknesses. Typically, these engagements include CIO level consultants and other technical resources as required.

Our approach includes:

  • Examining and testing both inside and outside your IT infrastructure network. We pay special attention to the data center, computing environments, the network within your corporate office, remote offices and third-party providers.
  • Scrutinizing other data including your policy and procedure documents, artifacts regarding your IT operations, infrastructure, physical security, etc.
  • Providing social engineering assessments, data breach forensics, cloud readiness evaluations, IT operations reviews and IT policy review and creation.
  • Producing a comprehensive strategic report that captures all findings and recommendations in priority order. It includes an executive summary along with proposed IT changes and budgetary estimates if required.