(314) 487-6008 or (800) 651-8788

  When you need an independent security audit...  Call Us!

  

Base Line Internet Security Services (BLISS)   Emergency Services Available  Protect your Company Assets and practice Security Due-Diligence
_______________________________________________________________

SUBJECT:      Protecting Your Information Assets and IP

Is Your Network Secure?  Can You Prove It?  BLISS can!

As the Director, Executive, Officer or owner of your organization, you need to know that your network is secure against the latest threats, and at a glance, determine if your security is trending in a positive or negative direction.  Security has changed over the last year, with new data security threats appearing weekly or daily, attacking organizations indiscriminately.  Hackers are becoming more sophisticated in their use of tools and automated programs to crack the security of networks.  This is further complicated by your organization’s dependence on your networks and IT infrastructure for internal and external communications, e-business, customer service and general employee productivity, elevating security to a top priority for the sustained livelihood of your business.

Your organization probably has a mix of security tools and procedures they implement today.  But with the increased importance of comprehensive security for your enterprise, and the rapid pace that new threats and attacks are being developed, ask yourself:       

  1. Are the tools we are using comprehensive and up to date – are they checking for all of the latest known security vulnerabilities?
  2. Are we using freeware or open source security products to audit our most important security policies and practices?
  3. Are we generating validation security reports to create a documentation trail as a corporate record to demonstrate appropriate security due diligence for regulatory, insurance, legal and other agencies?  Are we in compliance with the Homeland Defense Initiative? 
  4. How much time do my people spend updating the vulnerability DB, running security checks, interpreting results, generating reports for management, researching the threat, then applying appropriate fixes to resolve vulnerabilities?
  5. How often are we testing our network to confirm that we are not vulnerable to new threats?  If you are not testing your network on at least a weekly basis, it may not be frequent enough.

INTEK offers BLISS (Base Line Information Security Services) to address the issues outlined above and to assist senior management in quickly prioritizing the application of appropriate resources in your organization to resolve security threats.  Our BLISS is complementary to the infrastructure and expertise you have in place, providing 3rd party validation of your security, as well as tools to make your IT team more efficient in resolving vulnerabilities.  BLISS will save your company time and $$ by automating the vulnerability detection process and reducing the time for your team to resolve vulnerabilities rapidly with our unique context sensitive corrective intelligence.

BLISS is extremely simple to set-up and use, requiring less than 5 minutes of effort on your end.  Please put me in touch with the right person in your organization to provide us with a few technical details so that we can provide you with a TEST DRIVE of BLISS to demonstrate the business benefits of our Base Line Information Security Service..

For more information or knowledge of the security issues facing the world today go to - click on 
CIO
and click on   2002 CSI/FBI Computer Crime & Security Survey 

All of INTEK’s services are completely confidential.

I have attached our BLISS Validation System for your review.  Please contact me

Thank you,

Jim Tracy
Executive Vice President

INTEK
(314) 487-6008
jimt@intek.net 

Contact Jim Tracy @ INTEK for a Base Line Information Security Solution - BLISS 

NOTE
: BLISS is designed to have a minimal impact on network bandwidth while a test is running, typically requiring no more than 1% of the total bandwidth. No vulnerability tests are run that might cause a server to crash or in any way deny services to legitimate network users. 

The Government’s Cybersecurity TOP SEVEN Recommendations
FLASH Business Card  

Is your Company Safe?