
ISO Certification ISO/IEC 27001 and 27002 are Information Security Management System (ISMS) standards published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) that specifies a management system that brings information security under explicit management control. Being a formal specification means that it mandates specific requirements and is subject to formal audits and certification compliance and requires systematic checks for security risks; design and implemention of coherent and comprehensive controls and/or other forms of risk treatment (such as risk avoidance or risk transfer). A management process must be adopted to ensure that the security controls continue to meet the organization's informatio security needs on an ongoing basis.
Penetration Testing A pent test evaluates the security of a system or network by simulating a malicious attack to check for technical flaws or vulnerabilities and can involve active exploitation of security susceptibilities. Any security issues found are reported along with an assessment of potential impact and a mitigation proposal. From an operational perspective pent testing helps to quantify threats and their impact and likelihood so that they can be managed proactively; budgeted for and corrective measures implemented. Pent tests are done to help safeguard your organization against failure, through:
- Prevention of financial loss by fraud (hackers, extortionists or disgruntled employees) or faulty business systems and processes.
- Proving due diligence and compliance to your industry regulators, clients and shareholders. Non-compliance can result in the loss of business, regulatory fines and bad PR among other consequences.
- Protection of your brand by maintaining consumer confidence and a solid business reputation.

Network Architecture Design
InfoShield provides professional design and implementation of network infrastructures to ensure maximum security, efficiency, cost effectiveness and flexibility. Our security specialists and engineers have extensive experience in complex network design demands and will collaborate with your staff to understand your network security objectives and provide secure network technologies as well as best practice recomendations for your specific network environment.
Information Security Auditing
Information security needs to be implemented as a management system, based on a cycle of planning, implementation, review and correction. Whether you choose to implement ISO 27001, or a proprietary standard of compliance, you will need to conduct audits and reviews of your security infrastructure. Our professional security specialists are qualified to conduct audits that examine all critical components of internal networks, operating systems, applications, as well as your organizations ISMS.