Assessments are the starting point of any security program implementation. An assessment can give you an idea of your current security posture and what it will take to get you where you need to be. Depending on your required end result, security assessments look at your situation from different perspectives from technology to policies, procedures and behavior.
At the end of any assessment, you will receive deliverable documents that will give you an understanding of the changes that will help you meet your end goal.
Available assessment options:
- Policy Assessment
- Design Assessment
- Onsite Assessment
- Operational Assessment
- Risk Assessment
- Vulnerability Assessment
Security Program Development
This is the encompassing offering that will help to step you through creating a Security Program — from developing your security policy to designing your infrastructure.
Available plan and design options:
- Security Policy Development
- Security Design Development
- Business Continuity Planning
- Disaster Recovery Planning & Incident Response
Security Implementation Services range from Program Implementation to configuration services, taking the assessment recommendations and the design to the next level.
Security Program Implementation
Security Program Implementation takes the assessment and design recommendations to the next level — implementation. The overall program implementation includes implementing your security design, policies and procedures.
Available implementation options:
- Security Configuration
- Non Production Penetration Testing
- System Hardening
- Security Policy Training
A security audit will evaluate your existing infrastructure against your security design or policy, or against a known and accepted standard or government requirement. Compliance examples include items such as the NERC CIP standards, ISA SP-99, NIST 800-53, NIST 800-82, etc.
Managed Security Services encompass a wide range of offerings to help you manage and maintain your plant floor security.
Available managing and monitoring options include:
- Remote Monitoring
- Incident Response
- Disaster Recovery