The Integris security-centric audit engages in the collection and analysis of your IT practices, procedural documentation and technological control information to produce a detailed report on the vulnerability levels your organisation is being exposed to. It includes access to our latest audit management expertise and leverages on the benefits our time-saving and un-intrusive collection processes bring to the table. The audit includes key personnel interviews, a walk-through of your physical locations and assets that may impact the effectiveness of your security program. These measures are designed to verify that existing controls conform to your organisation’s risk assessment and best practice standards known to industry. This thorough and highly-structured process is designed to identify critical vulnerabilities and weaknesses and verify that policies are observed.
Next Generation Internet Filtering & Security
Our business is to maximise the productivity of your business and keep it safe online.
With our robust, timely and effective solutions, you can ensure safe internet access for your employees while protecting your network and branch offices against threats. Integris offers real-time protection and offer far more comprehensive coverage against malware than the competition.
Some 40% of web browsing is non-work related. You need to know how your organisation is spending time online, and then you need the tools to take the necessary action.
We provide a complete solution that gives you real-time insights into users’ online behavior, and the means to implement policies. Our solutions are:
- No risk, quick to implement, and just two weeks to a positive ROI.
- Effective against web-based threats.
Conducting your day-to-day business effectively involves having access to email wherever you are. I know (like me) you think it will never happen to you but lets be honest – when was the last time you had a close shave? As we add more and more functionality and data Phone Security accessible through your smart-phone, securing it becomes a major concern of corporate data security.
Malware & Security Updates
On a monthly basis, we inspect each server and workstation to verify that the latest updates have been applied to the AntiVirus & AntiSpam applications. In addition. we also make sure that the latest system updates and patches have been applied to the Operating System.
This strategy provides the best possible protection against the latest virus attacks and security breaches announced periodically by the software vendors.
At the lowest end of the security scale you will find that reputable smart-phones (Android Apple and the new Microsoft Windows Phone 8) allow you to configure a screen lock on the device. The screen-lock will need to be set to auto-lock after a minute (or two) of inactivity. It should keep most (but the most seasoned) of joy-riders from accessing your email or data.
However if you desire true corporate security and peace of mind then the only real way is to encrypt all the data (including emails) behind a passphrase. Once again, most of the reputable smart-phone brands support this feature without the need for any additional software. We have the knowledge and experience to plan and implement a roll-out of smart-phone encryption across your entire organisation.