Register Now - It's Free!
 
Treeplex Business Network
Log In
Email:
Password:

[Forgotten Password?]
Quick Preview
Company Profile Professional Profile
Treeplex Dashboard Associate Network
Security Risk Management
Name:

Security Risk Management

Location: Newcastle upon Tyne, UK
Telephone: 0191 2804744
Website: www.srm-solutions.com
Approvals: 0
About Us Members Offices Events News
  SRM is a market leading provider of ICT security services to public sector organisations across the private, government, defence and financial services markets. With our respective specialism’s we have built up a thorough understanding and grounding of the themes and trends within the ICT security market. This has ensured that we remain at the forefront of thought leadership and innovative product development.

SRM also have a forensic laboratory specialising in computer crime for the purpose of corporate investigations, civil litigations and criminal prosecutions with police forces and legal aid professionals.

SRM Services include:
• Security Analysis and Risk Assessments
• Information Security Consultancy
• Information Security Management Services and Systems
• ICT Forensic Services
• Financial (PCI) and Government Standards Compliance
• Business Continuity Services and Advice
• Personnel Vetting and Screening

 
  • Training & Development


  • IT Security


  • Information Technology and Services


  Products & Services
 

Payment Card Industry Data Security Standards (PCI DSS)

  PCI DSS stands for Payment Card Industry Data Security Standard, and is a worldwide security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC).

The standards apply to all organizations that store, process or transmit cardholder data – with guidance for software developers and manufacturers of applications and devices used in those transactions. A company processing, storing, or transmitting cardholder data must be PCI DSS compliant.

SRM is a PCI Qualified Security Assessor (QSA)

 
 

Computer Forensics and Digital Investigation

  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as digital forensics.

The field of Computer Forensics also has sub branches within it such as Firewall Forensics, Database Forensics and Mobile Device Forensics.

There are many reasons to employ the techniques of computer forensics:

In legal cases, computer forensic techniques are frequently used to analyse computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).
To recover data in the event of a hardware or software failure.
To analyse a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.
To gather evidence against an employee that an organisation suspects of criminal activity or industrial espionage.

 
 

Information Security and Information Assurance Consultancy

  Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.[1]

The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.

These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.

SRM provide expert consultancy in both of these areas.

 
 

Business Continuity Consultancy

  Business continuity planning (BCP) is the creation and validation of a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster or extended disruption. The logistical plan is called a business continuity plan.

In plain language, BCP is working out how to stay in business in the event of disaster. Incidents include local incidents like building fires, regional incidents like earthquakes, or national incidents like pandemic illnesses.

BCP may be a part of an organizational learning effort that helps reduce operational risk associated with lax information management controls. This process may be integrated with improving information security and corporate reputation risk management practices.

 
 

Personnel Screening & Security Vetting

  Background checks are vital. If you want to be sure the person you're about to employ is who they say they are then we can help: our background checks are thorough and effective.
Our background checks are professional, efficient and accredited: rest assured, your vetting is in reliable hands. We are audited to ISO9001:2000 for quality management and are recommended by the International Professional Security Association (IPSA).

In addition to this we are the first company worldwide to offer you a UKAS Accredited Vetting Certificate which meets BS7858:2006.
This means you'll have proof that an individual's background has been investigated to a qualified level and that the quality process has been achieved.

If it's peace of mind you're after, there is no better standard.

 
 
© Treeplex Network. All rights reserved 2009. Directory | Feedback | Terms | Privacy | Blog