Home Domains Leadership Corporate Services ProcessOne Contact Us  
Services » Security Assessments
At ACM Business Solutions our vision of protection and excellence is supported by a business-driven and standards-based approach to every engagement. Our consultants conduct each assessment using a methodical and repeatable process to identify vulnerabilities in an organization’s infrastructure..

Our goal is to identify vulnerabilities within our client’s applications and network infrastructure and to provide effective guidance for protecting against identified vulnerabilities.
 
Network Assessments
Our experienced professionals can perform a series of technical assessments to identify vulnerabilities that may exist at the network level. Network Assessments can be performed from either an internal or external perspective. Additionally, we can perform Dialup Assessments to identify rogue modems that may provide a mechanism for unauthorized access to information systems.
 
Application Assessments
Application Assessments are performed to identify vulnerabilities that may exist at the application level. ACM consultants will perform several analysis steps to identify constituents and data flows, and to understand the system architecture that supports the application. Our consultants will perform a series of penetration tests to identify potential application security weaknesses.
     
Organizational Assessments
An Organization Assessment is a non-technical review of an organization’s security posture. Our consultants will evaluate policies and procedures, physical security, tangible and intangible assets, and identify information types. Additionally, a threat and vulnerability analysis is performed to identify the organization’s current risk posture.
   
 
Information Security Overview
Security Assessments
Security Engineering
IS Strategy
Strategic Consulting
Project Profiles
Staffing Services
Management Consulting
Business Process Outsourcing
Copyright 2008 ACM Business Solutions LLC, All rights are reserved. Read Privacy Policy.