FluidIT Group

Keeping Your Business in Motion

1-888-88FLUID

Expertise

Along with years of in-depth practical experience, FluidIT Group Co-founder Paul Robertson moderates the Firewall-Wizards mailing list and is active in the Information Security community.

Risk Management (Security)

FluidIT Group's comprehensive Risk Management program offers assessment, implementation, planning and response services to ensure that your business or organization is prepared for anything today's connected world throws at you. Security is really about risk management, not just firewalls and complex passwords. At FluidIT our security expertise is second to none. We can design, implement and manage your security for you, or we can work with your team to proactively improve your organization's security posture.

There are countless IT vendors out there who will sell you "security" solutions without understanding your business and without understanding your risk. At FluidIT, we understand that security is really all about identifying and mitigating risk. A system's exposure is a balance between access and control. Our approach is geared toward ensuring maximum effectiveness of your existing technology and security investments- Firewall, ACLs, GPOs, SRPs and more.

Our proven assessment process will provide you the best approach to reducing your risk, with a minimum impact on your business. Once your comprehensive Risk Assessment is completed, we will provide you with recommendations for minimizing risk and a plan for implementing the necessary changes. If you choose, we'll be there to see those changes through or to assist your staff in the implementation.

Risk Management is about preparation and minimizing exposure. We offer Disaster Recovery Planning, Incident Response and Computer Forensic services. All systems have at least some exposure to risk- we have the knowledge and the experience to reduce that risk now and going forward.

We provide the following security services:

Security Design
Security Recommendation
Security Testing/Evaluation
Security Implementation
Security Operations
Security Monitoring
Disaster Planning
Firewalls
Intrusion Detection/Prevention
Regulatory Compliance Programs (GLB, HIPAA, FISMA, SOX, ISO17799...)
Content Filtering
Incident Response
Policy Creation
VPNs
Litigation Support
Computer Forensics