banner3

the keepers

As the gatekeepers and host for literally hundreds of brand sites and online applications, we help your business, website and digital platforms be more secure and meet your sector’s best practices.

Every business is different, which is why we offer customized options, allowing you to stay nimble and grow in an evolving business landscape without sacrificing protection or a sense of security.

From hardware recommendations to software implementation, we offer side-by-side comparisons of the best options on the market, ensuring you have the best choices for your goals. Our team has in-depth infrastructure and framework knowledge, and we’re able to help you implement and integrate your digital assets and provide expertise in 8 key areas:


group-83

1. hosting

  • On-premesis
  • Off-premesis
  • Colo
  • Cloud

group-43

2. security

  • Risk assessment
  • Authentication (i.e. 2FA)
  • Web Security & System
  • Vulnerabilities (i.e. Ciphers)
  • Port Management & Operational Procedures
  • Compromised Environment Resolution / Reparation

group-327

3. log management

  • Setup Custom Centralized Logging using Splunk, ELK (ElasticSearch, LogStash, Graylog)

group-751

4. dashboard(s) setup

  • Setup Custom/Consumable Analytics (i.e. Grafana or Kibana w/ Prometheus)
  • Log Trending / Monitoring (in dashboards) Expedite & Proactive troubleshooting
  • Show both real-time & batch-based statistics:
    Website/Application, Database, System (i.e. memory/cpu/network traffic)

group-431

5. redundancy

  • SQL Clustering
  • Caching/Performance (i.e. CDN)
  • Static Pages (maintenance & transitioning)
  • Load Balancing (Multiple Web Servers)
  • Disaster Recovery
  • Data Redundancy Management (i.e. Backup Retention Scheduling, Recovery Plan)

group-43b7ae71cf73bb47c69a80f6db1cd121cc

6. change control management

  • Planning/Minimize Risk
  • Dedicated window of time/staff
  • Backout Planning
  • Verification/Smoke Testing
  • Documentation

group-51

7 . compliance

  • PCI (Payment Card Industry) DSS: Ensure cardholder data is processed, stored and/or transmitted in a secure manner
  • HIPAA (Health Insurance Portability & Accountability Act): Ensures privacy of PHI through architecture, audit control, integrity, person or entity authentication, & transmission security.
  • GDPR (EU’s General Data Protection Regulation):
    • Lawfulness: Ensure customer consent.
    • Transparency: Sound alarm if data is breached.
    • Fairness: Respect the right to be forgotten.
  • CCPA
  • SOX
  • FERPA
  • NIST
  • HITECH
  • Identity Theft + Assumption Deterrence Act

group-75

8. vendor management

  • Planning/Minimize Risk
  • Dedicated window of time / staff
  • Backout Planning
  • Verification / Smoke Testing
  • Documentation
info

We hold ourselves and our clients to business best practices and have experience in helping brands navigate complicated compliances. Our IT and security services are quality and compliant and can offer peace of mind in both the quality of your standards, and the standard of your security.

technology partners

microsoftazure
experian
sitefinity
kentico
dellemo
vmware
veeam
verizon
eset
slack
android
zoom
googleapi
googleanalytics
imperva
microsoft
wordpress
f5
adt
flexential
spectrum
centrylink
office365
windows_new
ios
google
unifi
hubspot

related case studies