At Futuresoft we take a wholistic approach to security implementing administrative, physical and logical controls to safe guard information systems and their data in order to achieve an acceptable level of risk.
Futuresoft has implemented this approach in securing both public and private sector data and networks from hacks, unauthorized disclosure of data, website defacement and Denial of Service attacks.
Our IT security solutions are closely tailored to the United States National Security Agency (NSA) top 20 Security Controls for effective enterprise cyber defense. This is adapted from the US National Institute of Standards and Technology (NIST) Special Publication 800 series and supported from the UK Center for protection of National Infrastructure (CPNI).
The following gives an overview of IT security solutions we offer:
We offer continuous Monitoring through Vulnerability Assessment and Remediation with POAM (Plan of Action and Milestone) reporting, as well as periodical network and online penetration testing and Red Team exercises.
What will happen to your business if your office burns down, if your equipment is stolen or all data is wiped from your primary systems. We offer disaster recovery and business continuity planning and testing services.
Putting expensive IT security measures in place is in line with global best practices, but it’s key not to forget that security breaches are often caused by the carelessness or lack of knowledge of your own employees. We offer employee IT Security and Awareness Training that focuses on basic IT security practices as well as periodically updated threats and new protocols.
- Enterprise Security Architecture including, but not limited to:
- Data At Rest (DAR) Encryption
- Data Loss Prevention (DLP)
- Physical and Logical Security Assessment with threat analysis
We also offer the following IT Security consultancy services to both private and public sector organizations.
- Enterprise Security planning (Physical & Logical)
- Business Contingency and Continuity planning
- Incident Response Planning
- Security Assessment Reporting
- Configuration Management planning
- System Hardening following NIST, US NSA and Microsoft guidelines
- Application security
- IT Audits