In the area of security, ECS offers consulting services and technological solutions for the protection of User network infrastructure, i.e. for solving specific security issues.
The User network infrastructure and its protection are primarily based on the Cisco Systems products (a company that recognized us as its Gold Partner).
ECS is also a holder of the Advanced Security Specialization. Our portfolio of security solutions also offers solutions of our OpenTrust Partner for the construction of the public key infrastructure (PKI).
For network security control, real time log analysis and early security alerts ECS uses the solutions of its TriGeo Partner, whereas to provide maximum network protection against Internet threats ECS uses Arbor Networks solutions.
In addition to technological solutions, we also offer security consulting services, which include the following:
*Security risk assessment
*Security policy development and review
*Assistance in compliance with ISO27001 standard
*Analysis of device configuration, system design & penetration tests
As a result of our consulting services, the Customer obtains a report with recommendations how to eliminate any potential weaknesses and implement corresponding solutions.
Due to a team of certified experts working for and cooperating with ECS, we can timely eliminate any potential weaknesses and offer our custom-made solutions.
In important applications (e.g. an access to financial or personal data), the User needs to establish a rigorous control over the identity of persons accessing these applications.
It commonly implies a User Name (the User identifies him/herself as a person X) and a Password (I am really a person X because I know the password).
This control system is simple and apparently very cost-effective.
IT System Security Audit
IT systems are fairly complex, composed of a few interconnected units commonly maintained by different in-house people or departments, but very frequently there are external companies hired to maintain some parts of the system, like the network and applications.
The staff then spend more office hours on system maintenance and troubleshooting and less on the introduction of new functions.
The IT systems are fairly complex, composed of a large number of interconnected and dependent segments, and IT technology and Customer requirements change frequently and rapidly.
Concurrently, implementation deadlines are increasingly reduced, and consequently, IT systems become vulnerable to malevolent attacks.
Business Continuity Management
Security incidents are constantly increasing, whether in the context of global climate changes, progressively frequent large scale disasters, or political and economic turbulences resulting in catastrophic damages due to terrorist activities.
In addition to the above mentioned hardly foreseeable threats, the organizational and technical infrastructure is subject to design and implementation weaknesses and vulnerability, which can be used to inflict damage.
Logs are front and center in every organization’s plan to comply with regulatory standards and are used for forensic investigation, eDiscovery and operations.
Because of volume and diversity, collecting and storing logs can be problematic.
Getting control of your logs is the foundation for optimal operational security.
The area of information security in its essence is a response to business instability triggered by a number of internal and external factors.
Inherent vulnerability of information resources, systems and processes represents a constant organizational threat as these weaknesses can be used in different threats, which could result in profitability disturbance, loss of reputation, etc.