At ABL, we treat security as an ongoing process, not as an individual service or one-time project. When addressing security with our clients, we focus on four basic areas: assessment, policy, enforcement, and monitoring. Each one of these areas is comprised of various services and engagements that feed into each other for a comprehensive security plan. And once this cycle is completed, we begin the process all over again; this allows us to adjust for any changes within the organization, as well as any new technologies that may be available.
In this phase of the evaluation, our engineers work with you and your department to determine a baseline for your company’s security; from there we create a security roadmap or plan on how to achieve your end goals.
Policies act as the blueprint for what is acceptable in a client’s IT environment. Because your organization is unique, we will never use a “boilerplate” security policy. At ABL, we work with our clients to write policies that fit their individual needs.
In the enforcement stage, we work with our clients to employ tactics to make sure policies are being followed correctly. These tactics can take the form of adopting procedures or implementing technology.
The final stage in the security process is monitoring. This area receives the most attention because it is when all technologies are put into place and are maintained, updated and fine tuned. This is the stage in which reports are generated to highlight successes, as well as areas that may need to be revised.