ESTec Security
Client Login
Email:
Pass:
ESTec Security Search Sitemap Contact Us
Home
About Us Products & Services Newsroom Education Careers
Quick Finder
Education Main
Security History
Best Practices
Best Practice Resources
Intrusion/Penetration Testing
New Features
 
Security Training
http://www.sans.org/

World-Class Security and Network Training
The SANS (System Administration, Networking and Security) Institute was established in 1989 as a cooperative research and education organization. The SANS Institute enables security professionals to share the lessons they are learning and find solutions to the challenges they face.

  Visit SANS Institute  

 

 

Best Practices


Security Best Practices

There are a number of forums and commissions within the computer security industry. These bodies made up of leading consultants and experts in the field of information security for companies and government agencies, are at work today establishing the "best practices", the norms that should be used by everyone interested in protecting information from loss, theft, manipulation, and destruction by natural and human enemies.

ESTec consultants participate in some of the most prominent forums, appearing there as technical experts, and assisting the industry in identifying and documenting best practices for each level of security..

Applying "best practices" to your organization

Since ESTec personnel work with the international groups developing "best practices", we can assist your organization in implementing the practices necessary to ensure that your organization has met the due diligence necessary to prevent all recognized intrusion methods. This preparedness protects your company and its reputation while protecting the information provided by your customers, partners and employees. As new threats are identified, it is relatively simple to modify existing best practices and regain safety for your data.

This protection is not offered without attention to needs and costs, since every datum has associated purchase and deployment expenses, as well as potential savings that can be measured with a fair degree of certainty.

In most cases, achieving best practices in security of information does not require that your company makes large or repeated investments in esoteric technologies such as biometrics -- eye-scans and fingerprinting, e.g. --to protect your information, although achieving any business' best practices requires, above all, that your organization takes information security seriously. Beyond that critical step, choices appear that are only determined by your company's requirements and situation.

 

 
 
 
About Us | Products & Services | Newsroom | Education | Careers | Contact Us | Privacy Commitment | Terms of Use

©2002 ESTec Systems Corporation. All rights reserved.