Security
Security is comprised of 3 basic issues:
Of course, having these issues covered is not enough. You need a comprehensive, and most of all, fully integrated solution. This starts with the Security Polciy and Risk Assessment, moves on to Solution Selection and Implementation, and ends with Auditing and Review (from where it begins all over again). Secure Information Technologies is needs-focused and product agnostic, so we will never push solutions to you. Rather, we work with you, as a partner should, assessing real business needs, and using real business terms, we help you to prioritize, plan, implement and audit your integrated security solution. The following is a list of the types of products and services we have assisted our clients with. |
Security Policy
Internet / Intranet
Authentication / Single Sign-on
We are proud of our work, but we also respect the privacy of our clients. References are available upon request for serious inquiries only. Due to the nature of our work in this area, specific solutions may not be directly attributed to specific clients. |