Information Security Services

Our Information Security Services Practice (ISS) focuses on providing our clients with the tools, information, and services they require to design, build, and deploy a secure IT infrastructure.

From attack and penetration testing and disaster recovery planning to managed firewall and intrusion detection systems, ISS is committed to delivering state-of-the-art security solutions that meet industry best standards and practices. We help to ensure that our clients are protected against the wide range of threats that face their infrastructure. Those threats can be anything from natural disasters to malicious employees or the stereotypical attacker.

In today’s computing environment, attackers are no longer primarily focused on breaking into a specific institution; but rather on locating targets of opportunity that are vulnerable to a growing list of exploits. Without employing proactive security measures, it is not a matter of if your computer systems will be compromised, but rather when.


Our Information Security Services Practice is dedicated to working with our clients’ existing staff and processes to develop a computing environment that protects the three areas of vulnerability within an organization:

C: Confidentiality of customer or proprietary data.

I: Integrity of information systems and assurance of their reliability.

A: Availability of information resources, so that business operations are not interrupted.

Services & Competencies

  • Managed Security Services (Firewall, IPS, IDS, and Content Filtering)
  • Security Architecture and Design
  • Attack and Penetration Testing
  • Auditing and Compliance Advisory
  • Disaster Recovery and Business Continuity Planning
  • Application Design Review
  • Application and Network Vulnerability Assessment
  • Security Policy Design and Implementation
  • Security Monitoring and Analysis
  • Wireless Network Design, Security, and Implementation
  • Security Architecture and Design
  • Cloud Security Design, Implementation, and Operations
  • Incident Preparation, Incident Handling/Forensic Analysis
  • Security Auditing
  • Application Security Architecture and Compliance
  • Wireless Network Security
  • Security of Emerging Technologies, including Artificial Intelligence (AI) and IoT
  • Security Awareness Training