∙ COMPLIANCE STANDARDS ∙
   SERVICES
Compliance and Security Services
  Incident Response
Forensics
Pen Tests
Compliance Assessments
Vulnerability
Assessments


Security Associates Corp™
5218 Keller Ridge Rd.
Clayton, CA 94517
(925)672-2008
HOME SERVICES Compliance and Security Services
Vulnerability Assessments

Security Associates Corp
™ offers a complete portfolio of interrelated security services, designed to assist organizations in assessing, measuring, analyzing, and resolving information security vulnerabilities. Security Associates offers a comprehensive, in-depth assessment service that identifies major risk areas within an organization's network and environmental infrastructure. Security Associates provides customized assessment solutions that are focused on understanding the organization's underlying business objectives, and creating a customized suite of assessment solutions specifically tailored to the organization. Security Associate's Vulnerability Assessment Services help organizations understand potential security exposures that can lead to a compromise of critical information, and help organizations develop security strategies that fit their business requirements and security needs. The Security Associates Vulnerability Assessment Service is comprised of multiple assessment components. Each of these customized components can be included as part of the overall assessment service. These assessment components include:
  • Certification and Accreditation - identifies system compliance gaps and offers remediation strategies and management solutions to address any discovered weakness. The C & A process incorporates interview sessions with key personnel to analyze the overall state of the information security environment, System Test and Evaluation, SSP preparation, POAM creation, artifact collection and Agency ATO/IATO if applicable.
  • Firewall Review - offers a comprehensive review of the security of firewall deployment and management to identify and address the risk of firewall breaches and loss of critical information. Firewall reviews are conducted onsite, and provide both external and internal review of the firewall, including system OS configuration, firewall software configuration, and authentication and access control policies.
  • Server and Host Review - offers a detailed look at an organization's server environment in order to analyze individual servers, and their ability to enforce confidentiality, integrity, and system availability, while protecting information and assets. The Server and Host review addresses both external and internal analysis, including overall system architecture and configuration, policies, and usage and management of the environment.
  • Web Server Review - offers analysis of an organization's web servers to identify potential risks and vulnerabilities that could lead to a compromise of the web server's access controls, and the critical information the server stores, transmits, and receives. The Web Server review addresses both external and internal analysis, and includes overall system configuration, policies, and usage and management of the environment.
  • Business and Security Policy Development - offers the analysis and development of corporate policies, including Business Policy, Security Policy, Information Security Policy, and End User Authentication and Authorization Policies.
  • Secure Architecture Design - offers assessment and comprehensive development of an organization's overall information security system to address overall security and assurance requirements, including system availability, data integrity, access control configurations, and audit requirements.
  • Secure Systems Integration - this turn-key security process helps organizations design and integrate new services, applications, components, policies, and educational training programs throughout a networking environment to create a truly secure and trusted infrastructure.
Security Associates Vulnerability Assessment Tool, the ECM, is the delivery mechanism for the overall Information Security Assessment Service. The ECM incorporates each of the customized assessment components to provide a complete overview of an organization's Information Security "readiness", while providing the foundation for additional security product and service solutions through Security Associates. In addition to the Information Security Assessment service components, ECM also supports additional services offered by Security Associates, including network penetration testing and forensics analysis, disaster recovery review and planning, and business contingency planning. By providing the comprehensive, in-depth assessment of an organization's Information Security environment, Security Associates is able to offer proprietary, customized solutions to assist in the analysis and development of an organization's trusted infrastructure.





   © 2011       Copyright Security Associates Corp™
HOME | CONTACT US | TOP