There is no secret that information security nowadays is a cornerstone of organization’s activities whether it’s large retail or public organization. It is quite obvious that without competent and skilled professionals in this area it is virtually impossible to ensure confidentiality and integrity of information on the highest level. Worth to say such kind of professionals are the core of the IT-Escort company and, moreover, they have wealth of experience in the information security field.
IT-Escort is one of the top-ranked companies in Ukraine in providing information security services. We are specialized information security competence center for the design and deployment of integrated solutions creating the security perimeter of large enterprises, government agencies, infrastructure, municipalities and distributed information systems. Our certified staff cover up a wide range of issues related to both the audit and the implementation of information security systems, as well as the construction of multilevel data protection concepts.
Actually, an audit of enterprise information security management systems (ISMS) is a priority area of the company’s activities. We conduct a thorough and professional audit of the ISMS. If the ISMS is not implemented in the company, we assist to prepare the company for its implementation and we provide auditing of the current information systems and regulations as well as draft a recommendation report for the implementation of the ISMS in the company.
The audit is carried out only by the team’s certified project manager (Project Management Professional) and certified specialists in the field of auditing and implementing information security systems according to the standards: IEC/ISO 27001, ISO 20000, IEC/ISO 31010 и IEC/ISO 9001.
IT-ESCORT offers a full range of services and effective solutions for data protection from external attacks:
IT-Escort analyses and evaluates the compliance of the Customer’s Information Security Management System (ISMS) with the existing requirements of world-wide standards for information security management. In particular, we analyze already implemented security policies, organization of information security, human resource security, resource management of the ISMS, access control, cryptography, business continuity management, communications security etc.
Carrying out the audit our experts analyze and evaluate:
According to the audit results in the case of non-compliance with standards, the Customer will receive a report and recommendations for finalizing the information security management system. The results of the work can be considered as the first stage in the construction and further certification of the information security management system for compliance with the requirements of the international standard ISO/IEC 27001. The estimated duration of work completion is from 1.5 to 2 months.
Concept development and construction of the security perimeter of the information infrastructure with the highest level of business protection, information systems, as well as guaranteeing the continuity of business processes. The company posses long-standing and successful experience in risk management, designing reliable security systems, certified engineers in the implementation and maintenance of equipment and software.
Undertaking the project, we pay thorough attention to how to manage potential risks, including:
IT-Escort offers a range of video surveillance and face recognition services based on NEC RECOGNITION SYSTEM products, which is the world leader in the analytic systems and dynamic face recognition in the flow of people. This complex includes a broad network of surveillance cameras installed in the most crowded places, shopping and entertainment centers, critical infrastructure facilities and other locations requiring continuous monitoring.
We also implement software and hardware systems with a video analytics system, as part of a single security perimeter. The introduction of analytics systems of unstructured data for analyzing video, audio and text content based on the product HP Autonomy IDOL.
Within the framework of construction of the general security concept and staff control system for an enterprise or institution including work schedule, IT-Escort offers a number of proven solutions: access control to the premises, access to floors and office. It can be customized. Identification of users of this system is possible both using contact-less cards and using bio-metric methods: fingerprints, face recognition, retinal scanning, identification of the pattern of the veins of the palm. This solution can work together with the video surveillance system and bind the time and place of passage of the perimeter borders with the recording on the cameras, which will allow a quick search in the video archive.
Using various technologies, IT-Escort designs and constructs perimeter security systems depending on Customer’s budget and terrain conditions. For instance, it might be solutions based on the following technologies: