Within the IT industry "BEST PRACTICES" are similar to the
building codes required in homes and office buildings. We guide management in
establishing and enforcing IT policies. We assist client administrators
demonstrate that security practices and configurations fully reflect policy by
conducting periodic vulnerability assessment, penetration testing and
Salina.net provides information technology support for business, government, civic organizations and individuals. We can be engaged as project managers, independent auditors, or work with executive boards in advisory relationship(s). We meet client requirements in retail, manufacturing, litigation support, health care, law enforcement, government, banking and lending institutions. Though located in Salina, Kansas we maintain a world-wide client base.
Enterprises falling under HIPAA, GLBA, and Sarbanes-Oxley regulatory oversight are increasingly required to provide periodic reporting of systems audit. Regulators are encouraging the engagement of third party auditors for systems review. We provide well established investigative and review processes. We assist with policy review, architectural documentation and vulnerability assessment against real time threats to deliver the desired assurance of regulatory compliance and best practice deployment methods. Our business focus is IT technology security assessment and validation.
While we maintain capabilities in general computing solutions, our core competency is information technology security assessment and remediation. Our professional staff maintains audit certification (GSNA) along with Microsoft Professional systems administration certification (MCSA), CompTIA A+ and CompTIA Networks+. Staff are qualified with 3rd party tool sets from Qualysguard and Core Impact in support of our audit and deployment assurance reviews.
We guide our clients in the establishment of policy, business process re-engineering and provide verification services to ensure policies are implemented as planned. We guide our clients in accomplishing the 'pillars' of information assurance: confidentiality, integrity, authentication, non-repudiation and availability. We fully credit the developers, instructors and professionals at SANS for their leadership in consensus of IT best practices and defining "Defense in Depth" concepts. Client experience demonstrates that deployment standards and implementation of industry recommended best practices result in order of magnitude cost reductions in long term measurement. We happily recommend vendors who provide hardware or software.
Recommended Security Links NIST Intternet TIme Service NTP
Free Tools to Run Your Business and Open Software