WhoBy John Moore | Posted 2007-03-09 Print
An outside consultant can bring fresh insights on a company's security practices. Make sure you establish ground rules first.'s Who in Security Services">
|Who’s Who in Security Services|
|Big Four auditors||Offer information-technology security reviews, drawing on their background in auditing and management advisory services.||Deloitte & Touche, Ernst & Young, KPMG, PricewaterhouseCoopers|
|Systems integrators||A number of integrators operate security consulting practices or embed security within broader service lines.||Accenture, BearingPoint, Computer Sciences Corp., Electronic Data Systems, IBM|
|Security/risk consultants||Offer security consulting services including computer forensics.||Kroll, Protiviti|
|Security product vendors||Security product vendors may offer services ranging from penetration testing to security posture assessment.||Cenzic, Core Security, RSA Security|
|Managed security services providers||Remotely manage security devices such as firewalls and intrusion detection systems, but may also offer security assessments.||AT&T, BT Counterpane, CyberTrust, SecureOps, SecureWorks, Symantec, Vanguard Managed Solutions, VeriSign|
|Testing and certification companies||Certify that organizations comply with I.T. security standards such as ISO 27001.||BSI Americas, Intertek, SGS|
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...