Infosec |
14869
home,page-template,page-template-full_width,page-template-full_width-php,page,page-id-14869,ajax_fade,page_not_loaded,,qode-title-hidden,qode-theme-ver-10.1

[vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”left” background_image=”15518″ background_image_as_pattern=”without_pattern”][vc_column width=”1/2″][vc_raw_html]JTNDYnIlM0UlM0NiciUzRSUzQ2JyJTNFJTNDYnIlM0U=[/vc_raw_html][vc_raw_html]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[/vc_raw_html][/vc_column][vc_column width=”1/2″][vc_raw_html]JTNDYnIlM0UlM0NiciUzRSUzQ2JyJTNF[/vc_raw_html][gravityform id=”1″ title=”false” description=”false” ajax=”false”][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”center” background_image_as_pattern=”without_pattern” padding_top=”25″ padding_bottom=”25″][vc_column]

MANAGING TECHNOLOGY, SERVING BUSINESSES
Let Us Show You How Good IT Can Be
[/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” anchor=”infosec” angled_section=”no” text_align=”center” background_image_as_pattern=”without_pattern” background_color=”#eeeeee” padding_top=”76″ padding_bottom=”12″][vc_column offset=”vc_col-lg-offset-1 vc_col-lg-10 vc_col-md-offset-1 vc_col-md-10 vc_col-sm-offset-1 vc_col-xs-12″][vc_column_text]

SECURITY SYNTHESIS

[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_column_text]

We provide an entire department of security professionals looking after your network security around the clock.

 

The urgency of Information Security:

Small to Medium Business (SMB) is the most actively targeted and exploited business demographic. On average SMB firms that reported a security incident found that the intruder(s) were active on their business information systems for months prior to detection. The majority of SMB’s are protected with little more than a firewall at the network edge. As threats adapt and use different infiltration vectors these “edge-only” protection strategies are no longer effective. To achieve protection with the blended and adaptive threats of today a more holistic approach is needed. One that incorporates next-generation firewalls, internal heuristic traffic analysis, ongoing proactive vulnerability scanning, organization-wide event correlation, and network edge traffic analysis. Connecting and monitoring all of these disparate points of data has previously been out of the reach of SMB’s. Until Now.[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” background_color=”#eeeeee” padding_bottom=”50″][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]

24/7 Security Monitoring

[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_column_text]

Synthesis clients have a great advantage over their peers, their networks are being monitored 24/7 by CIT’s Network Operations Center (NOC).

[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]

Vulnerability Scanning

[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_column_text]

Synthesis services include randomly scheduled security health checks of your network, several times per month, including internal and external vulnerability scans.

[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]

Integrated Security Incident & Event Monitoring (SIEM)

[/vc_column_text][vc_separator type=”normal”][vc_column_text]Our analysts review reports to detect changes in your company’s security posture, seal up any security holes, and limit access to sensitive data.[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]

Network Core-to-Edge Monitoring & Protection

[/vc_column_text][vc_separator type=”normal”][vc_column_text]

Because we’re analyzing your network looking for malicious activity, we don’t rely on signatures to eliminate unknown or targeted threats.

[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” anchor=”Offered Services” angled_section=”no” text_align=”center” background_image_as_pattern=”without_pattern” padding_bottom=”10″][vc_column][vc_empty_space][vc_column_text]

OFFERED SERVICES

[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_tabs style=”vertical_left” el_class=”title_left_align”][vc_tab title=”Security Information & Event Management” tab_id=”d74b3a8d-f1d1-1″][vc_single_image image=”15519″ img_size=”full” alignment=”center” qode_css_animation=”element_from_right”][vc_separator type=”transparent” up=”12″ down=”0″][vc_column_text]If you experience a security event, we spring into action to contain and then remediate the situation.[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][vc_tab title=”Security & Compliance Reports” tab_id=”1430739489637-2-6″][vc_single_image image=”15521″ img_size=”full” qode_css_animation=”element_from_right”][vc_separator type=”transparent” thickness=”12″][vc_column_text]We will work with your auditors and deliver any needed reports showing that your systems and security are in compliance.[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][vc_tab title=”Log Management & Review” tab_id=”38aca7a5-367d-8″][vc_single_image image=”15522″ img_size=”full” alignment=”center” qode_css_animation=”element_from_right”][vc_separator type=”transparent” thickness=”12″][vc_column_text]Our professionals collect, parse, normalize, analyze and archive your log data to keep you secure and compliant.[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][vc_tab title=”Zero Day Protection” tab_id=”1430739681724-3-5″][vc_single_image image=”15523″ img_size=”full” alignment=”center” qode_css_animation=”element_from_right”][vc_separator type=”transparent” up=”12″ down=”0″][vc_column_text]

Because we’re analyzing your network looking for malicious activity, we don’t rely on signatures to eliminate unknown or targeted threats.

[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][/vc_tabs][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” anchor=”service” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” background_color=”#eeeeee” padding_top=”76″ padding_bottom=”65″][vc_column width=”5/6″ offset=”vc_col-lg-offset-1 vc_col-lg-10 vc_col-md-offset-1 vc_col-md-10 vc_col-sm-offset-1 vc_col-xs-12″][vc_column_text]

WHY CHOOSE CIT?

[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_column_text]

We deliver proactive IT solutions for small and medium businesses through a rigorous process that involves qualified engineers with an average of eleven years of industry experience. We deliver technology solutions in a repeatable framework using open standards that ensure measurable results for clients. As a result, companies are able to protect themselves from risk, are confident that IT will support their business goals and objectives, and realize greater peace of mind knowing that their systems are scalable. We’ve been doing this for over 15 years and to date have more than 200 customers.

What if you could:

 

  • Work with a company that takes time to understand your business and ensure that IT systems are designed to support your business goals
  • Work with a single partner that could build a strategic road map and demonstrate to you how technology can improve your internal business processes and increase your competitiveness
  • Help you manage your IT within an agreed budget making IT less of an unpredictable cost
  • Know 90% of your IT costs for the coming year and remove many risks and variables
  • Receive local support 24/7 and have someone who is there for you when a problem occurs
  • Have your IT systems monitored around the clock, from U.S. domestic data centers by CIT personnel
  • Have many problems identified and corrected before business productivity is impacted
  • Have access to the expertise and resources you need to support your IT team
  • Have support tailored to your needs and delivered on a predictable basis
  • Have the data to drive and support IT spending decisions and design choices.

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” anchor=”contact” angled_section=”no” text_align=”center” background_image=”15418″ background_image_as_pattern=”without_pattern” padding_top=”100″ padding_bottom=”125″][vc_column][vc_row_inner row_type=”row” type=”grid” text_align=”left” background_color=”rgba(255,255,255,0.75)” padding_top=”15″ css_animation=””][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

CONTACT US TODAY

[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_column_text]

Have any questions?  Please feel free to contact us online via the form below or by phone at the number listed.  We look forward to hearing from you!

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”full_width” text_align=”left” background_color=”rgba(255,255,255,0.75)” padding_top=”25″ padding_bottom=”25″ css_animation=””][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1448049158427{padding-left: 15px !important;}”][vc_single_image image=”15401″ img_size=”200×55″ qode_css_animation=”element_from_fade”][vc_separator type=”transparent” thickness=”6″][vc_column_text]

2424 North Davidson St.
Suite 111
Charlotte, NC 28205

[/vc_column_text][vc_separator type=”transparent” thickness=”3″][vc_column_text]

Phone 704 . 392 . 3031
Toll Free 888 . 674 . 7935
Fax 704 . 392 . 3172

[/vc_column_text][vc_separator type=”transparent” thickness=”3″][vc_column_text]

www.corp-infotech.com

[/vc_column_text][vc_empty_space height=”5px”][vc_column_text]IBM-logo-200w[/vc_column_text][/vc_column_inner][vc_column_inner width=”2/4″][contact-form-7 id=”15529″ html_class=”default” title=”Contact Us – Homepage Footer”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column][vc_column_text]

[/vc_column_text][/vc_column][/vc_row]