Virtualization

Recent technology trends have placed an increased focus on virtualization services, commonly known as “cloud computing.” While there are many legitimate applications where the cloud can be used to significant advantage to the organization, the exact role is often misunderstood. This is largely due to marketing efforts on the part of technology vendors, determined to move product rather than appropriately addressing the need of your organization.

Relying on public cloud offerings is typically advantageous only to the smallest of organizations, as the cost of implementing on a large scale often meets or exceeds the expense of properly implementing a local instance, or “private cloud.” Google, Amazon, and other providers have a long history of mining public service data for marketing and advertisement revenue. The private cloud also maintains your data in-house, keeping sensitive data where it belongs: under your organization’s direct control.

Let us help you develop a dedicated, secure, and robust offering that provides the benefits of cloud computing without the implied risk of turning your critical data to a public service. This technology is designed to scale, and can be tuned both for your immediate architectural requirements while developing a roadmap to greater resiliency and fault tolerance for the future.

Security

Assessment of security posture in the non-profit sector is critical due to the typically sensitive nature of data collected. Association Management Systems, for example, often house personal and financial information on members and transaction records for products and services offered. Most AMS product lines now offer integration with online applications, creating new avenues for malicious activity. Compromise of such information is embarrassing and potentially costly, directly affecting the credibility of the organization as a whole. Network assessment and architecture review mitigates this risk by exposing attack vectors such that remediation efforts may establish a more acceptable level of risk.

Security service offerings are available on a tiered schedule, allowing your organization the flexibility to develop a customized approach as appropriate for your technology environment:

  • Basic Network Discovery – This service is intended to enumerate externally exposed network assets and provide a general feel for potential vulnerability. This process may, if desired, be performed internally as well, taking into account architectural and design considerations that may be affected.
  • Enhanced Network Discovery – This offering includes a more extensive analysis of data obtained in the basic discovery service offering. This service takes a more aggressive approach, actively identifying specific vulnerabilities and prioritizing recommended action by the potential seriousness of a breach.
  • Remediation – These services available on a sliding scale, as determined by the results of the basic and/or enhanced services combined with your organization’s priority and participating in the re-design effort.