Security and Identity


We help companies keep their computing environments safe.

No doubt you’ve hears of security breaches from companies large to small, and the common theme is that most of these incidents were avoidable. Many organizations accumulate what we like to call “technical debt”, it’s the natural buildup of deferred maintenance that never seems to get addressed. We get it, you are busy doing what you do best.

The first step in addressing potential security issues is knowing where you stand. Across your technology stack and infrastructure you have a number of areas to consider, such as :

  • Software and operating system patches
  • End of life versions
  • Application vulnerabilities
  • Password management
  • Access control
  • Log management

We start with an assessment of your current infrastructure we like to call the “State of the Union”. We will make a sweep across your systems, assess your current security policies, and provide a report on where you stand. We will make recommendations based on your specific business, exposure to potential threats, and in order of priority

Armed with a roadmap and an agreed upon strategy, we will begin to implement solutions to your security issues in a process known as “Remediation”. While it seems intuitive to simply apply updates, there is frequently unknown issues lurking underneath this process.

During our assessment we will have identified the purpose of each system, understanding the services provided, and what it looks like when those services are broken. We take the careful and thoughtful approach when bringing your systems up to date so that we minimize any business impact or downtime for your organization.

With your house now in order, we will look at your security policies and processes and provide best practices and recommendations to keep your house secure. This may seem like a scary process as there’s usually some compromise between security and convenience or productivity. The good news is that technology in this area has greatly improved.

Beyond complex password policies and password management applications, Identity Management systems now provide a single system for granular access control across all of your internal systems as well as virtually any third party application. Imagine having a single password and encryption key to access all of your accounts across your Directory Services, Wifi, SSH, and SaaS applications, with a kill switch to disable access to all of those services in seconds? It’s life changing

Each client has different needs, and as such each project is customized to the technical requirements and business model of each client. The first step is knowing you have a problem, and we’re here to guide you through the process as a trusted advisor.