|
INFORMATION ASSURANCE PROGRAM |
IT
Management Programs
|
|||||||||||||||||||||||||||||||||
PROGRAM
OVERVIEW These services cover the daily requirement of retaining the information you and your institution relies on to do business. They also involve the ongoing task of understanding how to better protect that data and the confidence of recovering it in a disastrous situation. Data
Retention & Recovery Another key element to any program is to test the integrity of the data backups and the ability to perform a successful restore from it. All too often processes are put in place and followed, only to forget the main purpose of retention; recovery. Our program includes periodic system and data restores to validate the backups being performed. These tests not only provide peace of mind, but also meet the best practices that federal regulators look for. Vulnerability
Assessments Cornice provides comprehensive network scans and plain-English management reports to enable you to not only manage the identified risks, but also make informed decisions about mitigating them. Penetration
Testing System
Hardening Our highly-skilled engineers will work with you to review the vulnerabilities and analyses to determine the best course of action. As a component of this program and our security first approach, system hardening is an ongoing and pro-active task. The
TOTAL Solution ENGAGEMENTS
Clients have engaged us to perform each of these program components separately and collectively. In order to satisfy a classification as an independent third-party in Vulnerability Assessments, it is necessary that Cornice is not managing the network prior to the assessment process. It is reasonable for our security professionals to perform ongoing informal assessments to harden those systems and to minimize the number of vulnerabilities uncovered in a more formal independent audit. |
For
additional information: |