ERM offers comprehensive security assessment services that address IT security risks on an enterprise-wide basis. Our services result in the identification of critical gaps in your information security architecture that prevent you from achieving your information security goals and objectives. Our assessment approach considers the people, processes, systems, and third party service providers that support and deliver information technology services to your organization.
ERM offers penetration testing and vulnerability assessments of the following systems and processes:
ERM offers data breach and leak prevention assessment services. Our assessment approach examines both intentional and unintentional release of information to an untrusted environment.
ERM can help your organization meet the security, confidentiality, availability and privacy requirements of one or more regulations. We offer a modular approach based upon your needs, consisting of one or more of the following components:
ERM offers security foundation assessment services to ensure that your existing plan and safeguards in place for managing security risk are relevant and sufficient. Your foundation is defined by how you manage, protect, and distribute information through appropriate policies, procedures, and safeguards. ERM can also design a tailored plan that is directly aligned with your current or proposed information security architecture. Our security foundation assessment services include:
ERM offers a number of security assessments that determine whether systems and data are protected from unauthorized access, use, disclosure, disruption, modification, or destruction. Our baseline approach evaluates the configuration of hardware and software from a technical perspective, as well as the processes and people supporting these systems. ERM provides security baseline assessments over the following:
ERM offers other assurance services that are often a key component of your organization’s IT governance
and oversight responsibilities. These services will help you fulfill the requirements of both internal and
external stakeholders and include: