Identity & access management (IAM) solution design & deployment :: Federation :: Standards-based single sign-on (SSO) :: Compliance-proof access certification solutions :: Role-based access implementation :: Fine-grained authorization solutions :: Managed services
ISO/IEC 27001:2005 implementation consulting and certification audit :: Regulatory requirements and standards gap assessment (GLBA, HIPAA, PCI DSS, OWASP, ITIL) :: Enterprise security risk assessments :: Policy, procedures, and standards development
Web application security assessments :: Attack & penetration (A&P) testing :: Mobile application security assessments :: Infrastructure security assessments (firewalls, IDS/IPS, wireless networks, database systems) :: Third party security controls assessment
Technical architecture & requirements definition :: Vendor-neutral product evaluation & proof of concept (POC) :: Systems integration & configuration (custom-built & off-the-shelf) :: Project & Program management
Our philosophy is simple. We succeed when our clients are satisfied. To achieve this goal we are ready and able to go above and beyond the norm but without any compromise of quality and integrity.