Symtrexlogo OnTimeOnBudget
 

Services

Symtrex Professional Services is a team of trusted professionals whose mission is the management of risk through proven audit and assessment procedures.

The team has many years of technical experience in all aspects of security. We have the resources to assess, recommend, prioritize remediation, and to implement solutions.

Professional Services include:

The team consists of a number of individuals with a wide cross-section of expertise spanning system operations, network security architecture, security management etc. The team provides an exhaustive knowledge of security capabilities and vulnerabilities and a unique ability to quickly implement effective solutions. Since security is an ongoing process we can train and mentor client staff to assume the role of maintaining security best practices in their unique environments.


Policy and Business Systems Audits

A Security Policy and the related procedures are used to justify how business systems are used. For example, if bandwidth is an issue preventing MP3 traffic can significantly improve internal network traffic which can in turn reduce the cost of the network infrastructure. System audits when performed correctly can simplify business processes, which reduces the likelihood of costly mistakes. This simplification process enhances, productivity and results in a more secure business systems.

Risk Assessment and Management

If you do not manage your systems or have little understanding of what they do for your business you may be spending more money on technologies than required. We have seen instances during our audits where the value of the assets being protected was less than the cost of the technologies protecting them. Why spend $7,000 on a piece of security software to protect assets worth $3000? Our audits will ensure that you spend money where it is required so that the assets you need to protect are protected at a reasonable cost.

HIPAA, Bill C6, & PIPEDA Compliance Audit and Assessment
Top^

The new privacy laws in North America and those in force in Europe demand changes to how client data is protected and handled by businesses. Many companies have lost significant revenue in Europe because they have not been compliant with European privacy legislation in their North American operations. These new laws require certain measures that can result in serious losses of revenue if you are non compliant. We can guide you so that when enacted you will be onside with this upcoming legislation.

Privacy Audits

Privacy and security protection mechanisms are very similar. However the audit process is not. If a security specialist audits your systems they will be "hardened" reducing the risk of unauthorised use. How information flows from when data is received until it is archived and erased, who sees it and how it is used by your business is the scope of a privacy audit. Information handling, and what you do to protect the privacy of information entrusted to you by individuals is what the new HIPAA, Bill C6, & PIPEDA legislative requirements address.

Mentoring and Training

How systems are used most efficiently, reducing costs due to system usage errors, how visitors are escorted, and many other security issues are due to accidents, or lack of knowledge of how a system functions. Training can significantly reduce costly mistakes and enhance productivity. Understanding why something is done, and how it fits with other systems reduces many risks and often benefits the bottom line.

Physical Security Audits

Motion detectors, fire suppression equipment, locks, keys, secure rooms where critical devices are kept can all be wasted money. If your "secure server room" has a large bay window adjacent to a parking lot you may be spending money on protective devices for nothing. One truck backed into the server rooms window loaded quickly and driven away and your main servers may now be history. How can you prevent this type of scenario, ask us we can help by providing a Physical Security Audit.

Penetration Testing and Monitoring (Internet, Intranet, Web Services)
Top^

If we can change your web page using tools readily available on the web, how long before some bored teen does it just for kicks? Has your system been probed from the Internet? Our systems have been probed and scanned. We don't have to worry over much be cause we monitor this type of activity and patch the systems we use. If you have one IT support person they probably do not have the time or the tools to read the logs. Let us determine if you are at risk from these teenagers and help you prevent your web page from having unwanted images or messages posted on it. We can also significantly reduce the risk of you being used by these malicious individuals to hack someone else and being sued by them.