IT Consulting & Cyber Risk management

 



Linx Power offers pragmatic security services using top professionals with years of industry experience. Linx Power’s Information Security Assessment services provide a complete analysis of your organization’s security.

Benefits of a Security Assessment – By contracting Linx Power to provide its Information Security Assessment Services, you will see the following benefits:

  • Threat Exposure – Linx Power can identify and fix weaknesses and vulnerabilities from a technical, physical, and administrative perspective. We can also reveal the level of risk posed to your organization’s operations, IT infrastructure, applications, wireless, sensitive data, and personal information for both customers and personnel.

  • Comprehensive Reporting – We provide a detailed report both from a technical and management standpoint which shows issues, vulnerabilities and discovery methods. We will also provide an action plan to correct the problems in terms of a remedial, tactical, and strategic approach.

  • Product and Vendor Neutral Advice – Linx Power provides objective and independent advice with regard to the best alternatives for the implementation of a sound security strategy. Linx Power is not a reseller for any specific software or security vendors, and will provide unbiased recommendations.


Our Information Security Resources

Professionals – Linx Power’s Information Security and Network Services experts are 100% Certified Information Systems Security Professionals (CISSP).

Additional certifications held by practice members include: Cisco Certified Network Associate (CCNA), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Secure Software Lifecycle Professional (CSSLP), Microsoft Certified Systems Engineer (MCSE), Red Hat Certified Engineer (RHCE), Red Hat Certified Technician (RHCT), and Payment Card Industry Qualified Security Assessor (PCI-QSA). Additionally, Linx Power’s highly technical team of security professionals has an in-depth knowledge of a wide range of vendor hardware and software products.

Tools – Both commercially available automated tools and proprietary methodologies augment Linx Power’s data collection process. This information is compiled and presented to provide the client with a single reference of the tools that we may use on the engagement, based on the defined systems and environment. These tools and their usage are provided to the client prior to any work being performed.

Contact:

John Giordani, CISA

phone: 347.620.5469

information security assessment