Disaster Recovery

Home Page

  • Business Continuity planning
  • Disaster impact analysis
  • Damage assessment
  • Network and business process robustness analysis
  • Secure architecture, design, and implementation
  • Secure content management
  • Firewall, vulnerability studies, privilege management
  • PKI and related business implementation/integration
  • Event correlation & event monitoring
  • Intrusion detection services and implementations
  • Security Policy robustness analysis and business implementation
  • Disaster recovery training and education