At KIS we assess, design and implement information security (InfoSec) solutions in the areas of networking, edge and gateway solutions, high availability, vulnerability assessment, security policy development, encryption, remote access, intrusion detection and prevention, content filtering, authentication, anti-virus, anti-spam, access control, and zero trust.

Schedule a Free Consultation!

InfoSec is more than just implementing a hardware or software solution - it’s a process. You need to understand what you’re trying to protect, from whom you are defending your network, how you will protect your data, and know when you have been successful. InfoSec is only a theory until it is tested.

We have secured the networks of hundreds of organizations including Fortune 500 companies with complex multi-site networks, government agencies, academic organizations, and small businesses. Our consulting expertise and reputation for quality have landed us preferred partner status with the leading security product vendors.

KIS believes that the best way for our customers to reduce threats from cyberattacks is to develop a comprehensive cybersecurity program based on security controls and implement appropriate solutions for defending their resources from external and internal threats.

CIS-logo-RES

Did you know…

Organizations that implement the first 5 controls reduce their risk of cyberattack by 85 percent.

Download the CIS handout here

Our Process

Initial Assessment

We start by assessing your environment and identifying vulnerabilities. We also learn more about your organization’s objectives and requirements. This assessment encompasses vulnerabilities by priority that will include a Gap analysis.

REMEDIATION

Once we’ve completed our assessment, we remediate and / or mitigate the identified risks in your existing infrastructure by priority and build your defenses from there, implementing leading technology and automation where needed.

TESTING

We then engage in a second assessment that will test the new cybersecurity defensive implementation.

MONITORING

We use proven, industry-standard solutions to manage and monitor your critical infrastructure so you can focus on running your business.

InfoSec Services

Vulnerability Assessment
  • Continual/periodic review of firewall rules
  • Patching
  • Configuration Management
  • Version Standards
  • Licensing
  • Backup/DR testing
  • Documentation Review
  • Server & Data Security
    Infrastructure
  • NAC
  • Directory and Group Policy configurations and best practice reviews
Critical Security Controls
  • Inventory and Control of Hardware Assets
  • Inventory and Control of Software Assets
  • Continuous Vulnerability Management
  • Controlled Use of Administrative Privileges
  • Secure Configurations for Hardware and Software on Mobile Devise, Laptops, Workstations and Servers
  • Maintenance, Monitoring and Analysis of Audit Logs
  • Email and Web Browser Protections
  • Malware Defenses
  • Limitations and Control of Network Ports, Protocols, and Services
  • Data Recovery Capabilities
  • Secure Configuration for Network Devices, such as Firewalls, ROuters and Switches
  • Boundary Defense
  • Data Protection
  • Controlled Access Based on the Need to Know
  • Wireless Access Control
  • Account Monitoring and Control
  • Implement a Security Awareness and Training Program
  • Application Software Security
  • Incident Response and Managament
  • Penetration Tests and Red Team Exercises
Penetration Testing
  • External Credentialed
  • Internal Credentialed
  • WiFi Credentialed
  • Grey or White Hat
  • Passive or Intrusive
    Compliance Capable
  • Post Test Remediation
    Retesting
SIEM
  • Log Correlation
  • Event Monitoring
  • Data at Rest Visibility
  • Data in Motion Visibility
  • Alerts Triggered and Reported
  • Remediation by SLA
Security Management Services
  • Continual/periodic review of firewall rules
  • Patching
  • Configuration Management
  • Version Standards
  • Licensing
  • Backup/DR testing
  • Documentation Review
  • Server & Data Security
    Infrastructure
  • NAC
  • Directory and Group Policy configurations and best practice reviews

Find us.

Fremont Business Center
48383 Fremont Blvd. #122
Fremont, CA 94538


Call us.

510.403.7500