IT Security Practice
provides end-end security consulting services, supported by several of the
world’s leading computer security consulting experts.
Ø Vulnerability measurement: risk measurement, vulnerability testing, and security certification.
VPN & firewall, anonymity, privacy, multi-level security, and encryption
Authentication, authorization, single sign-on, LDAP, PKI and digital certificate
facilities access, business continuity planning, and disaster recovery testing
protection: from viruses, worms, Trojan horses, logic bombs, trap doors
Ø Protection from external threats: denial of service attacks, spamming, digital snooping, methods design/implementation
BPM employs industry experts to conduct its system security projects. All security reviews are conducted under the direction of our consulting security experts, who’s past accomplishments include being responsible for all security policy and implementation at the Central Intelligence Agency and managing the security vulnerability assessment practice for one of the Big 5 consulting firms. As a consequence, we are uniquely positioned with access to the true industry experts in this field. We also, as a practice, employ state of the art vulnerability detection and security certification software. For example, we typically leverage the Tru-Secure product, which assesses systems methodically for thousands of known security exposures, reporting on vulnerabilities detected. The result is managed risk, based upon measurement, up to and including complete security certification and branded security standards compliance.
Click for more
Sample consultant qualifications
Sample vulnerability test set