Security

At KIS we audit, design and implement information security solutions in the areas of IP networking, firewalls, high availability, vulnerability assessment, security policy development, encryption, remote access, intrusion detection and prevention, content filtering, authentication, anti-virus and anti-spam.


Security is more than just implementing a hardware or software solution, it’s a process. You need to understand what you’re trying to protect, from whom you are protecting it, how you will protect it, and know when you have been successful. Security is only a theory until it is tested.


We have secured the networks of hundreds of organizations including Fortune 500 companies with complex multi-site networks, government agencies, and small businesses. Our technical expertise and reputation for quality has landed us preferred partner status with the leading security product vendors.


KIS believes that the best way for our customers to reduce security threats is to develop a comprehensive security policy and implement strategies for defending their resources from external and internal threats.

KIS is a CIS Critical Security Controls Champion!


Did you know…

Organizations that implement the first 5 controls reduce their risk of cyberattack by 85 percent.

Download the CIS handout here

Our Process

Initial Assessment

We start by assessing your environment and identifying your areas of vulnerability. We also learn more about your organization’s objectives and requirements. This assessment encompasses initial vulnerability and penetration testing and results in a final report.


Remediation

Once your threat vectors are identified, we mitigate areas of vulnerability in your existing infrastructure and build your defense from there, implementing leading technology and automation where needed.

Testing

We then engage in a second round of assessment to test your organization’s strength against hackers, viruses, and ransomware.


Monitoring

We use proven, industry-standard solutions to manage your critical data. We’ll monitor suspicious activity, so you can focus on running your business.

Security Services

  • Continual/periodic review of firewall rules
  • Patching
  • Configuration Management
  • Version Standards
  • Licensing
  • Backup/DR testing
  • Documentation Review
  • Server & Data Security
    Infrastructure
  • NAC
  • Directory and Group Policy configurations and best practice reviews
  • External Credentialed
  • Internal Credentialed
  • WiFi Credentialed
  • Grey or White Hat
  • Passive or Intrusive
    Compliance Capable
  • Post Test Remediation
    Retesting
  • Log Correlation
  • Event Monitoring
  • Data at Rest Visibility
  • Data in Motion Visibility
  • Alerts Triggered and Reported
  • Remediation by SLA
  • Continual/periodic review of firewall rules
  • Patching
  • Configuration Management
  • Version Standards
  • Licensing
  • Backup/DR testing
  • Documentation Review
  • Server & Data Security
    Infrastructure
  • NAC
  • Directory and Group Policy configurations and best practice reviews
  • Email & Web Browser Protections
  • Malware Defense
  • Limitations and Control of Network Ports, Protocols and Services
  • Data Recovery
  • Secure Configurations of Network Devices
  • Boundary Defense
  • Data Protection
  • Controlled Access (Need to Know)
  • Wireless Access Control
  • Account Monitoring and Control
  • Security Skills Assessment and Appropriate Training to Fill Gaps
  • Application Software
  • Incident Response and Management
  • Penetration Tests and Red Team Exercises

Find us.

Fremont Business Center
48383 Fremont Blvd. #122
Fremont, CA 94538


Call us.

510.403.7500


Email us.

virtual@kiscc.com