At KIS we assess, design and implement information security solutions in the areas of IP networking, firewalls, high availability, vulnerability assessment, security policy development, encryption, remote access, intrusion detection and prevention, content filtering, authentication, anti-virus and anti-spam.

Schedule a Free Consultation!

Security is more than just implementing a hardware or software solution, it’s a process. You need to understand what you’re trying to protect, from whom you are protecting it, how you will protect it, and know when you have been successful. Security is only a theory until it is tested.

We have secured the networks of hundreds of organizations including Fortune 500 companies with complex multi-site networks, government agencies, and small businesses. Our technical expertise and reputation for quality has landed us preferred partner status with the leading security product vendors.

KIS believes that the best way for our customers to reduce security threats is to develop a comprehensive security policy and implement strategies for defending their resources from external and internal threats.

KIS is a CIS Critical Security Controls Champion!

KIS is a CIS Critical Security Controls Champion!

Did you know…

Organizations that implement the first 5 controls reduce their risk of cyberattack by 85 percent.

Download the CIS handout here

Our Process

Initial Assessment

We start by assessing your environment and identifying your areas of vulnerability. We also learn more about your organization’s objectives and requirements. This assessment encompasses initial vulnerability and penetration testing and results in a final report.

REMEDIATION

Once your threat vectors are identified, we mitigate areas of vulnerability in your existing infrastructure and build your defense from there, implementing leading technology and automation where needed.

TESTING

We then engage in a second round of assessment to test your organization’s strength against hackers, viruses, and ransomware.

MONITORING

We use proven, industry-standard solutions to manage your critical data. We’ll monitor suspicious activity, so you can focus on running your business.

Security Services

Vulnerability Assessment
  • Continual/periodic review of firewall rules
  • Patching
  • Configuration Management
  • Version Standards
  • Licensing
  • Backup/DR testing
  • Documentation Review
  • Server & Data Security
    Infrastructure
  • NAC
  • Directory and Group Policy configurations and best practice reviews
Critical Security Controls
  • Inventory and Control of Hardware Assets
  • Inventory and Control of Software Assets
  • Continuous Vulnerability Management
  • Controlled Use of Administrative Privileges
  • Secure Configurations for Hardware and Software on Mobile Devise, Laptops, Workstations and Servers
  • Maintenance, Monitoring and Analysis of Audit Logs
  • Email and Web Browser Protections
  • Malware Defenses
  • Limitations and Control of Network Ports, Protocols, and Services
  • Data Recovery Capabilities
  • Secure Configuration for Network Devices, such as Firewalls, ROuters and Switches
  • Boundary Defense
  • Data Protection
  • Controlled Access Based on the Need to Know
  • Wireless Access Control
  • Account Monitoring and Control
  • Implement a Security Awareness and Training Program
  • Application Software Security
  • Incident Response and Managament
  • Penetration Tests and Red Team Exercises
Penetration Testing
  • External Credentialed
  • Internal Credentialed
  • WiFi Credentialed
  • Grey or White Hat
  • Passive or Intrusive
    Compliance Capable
  • Post Test Remediation
    Retesting
SIEM
  • Log Correlation
  • Event Monitoring
  • Data at Rest Visibility
  • Data in Motion Visibility
  • Alerts Triggered and Reported
  • Remediation by SLA
Security Management Services
  • Continual/periodic review of firewall rules
  • Patching
  • Configuration Management
  • Version Standards
  • Licensing
  • Backup/DR testing
  • Documentation Review
  • Server & Data Security
    Infrastructure
  • NAC
  • Directory and Group Policy configurations and best practice reviews

Find us.

Fremont Business Center
48383 Fremont Blvd. #122
Fremont, CA 94538


Call us.

510.403.7500


Email us.

virtual@kiscc.com