The security of your IT network is critical to your business. If you operate in the healthcare industry, as one example, the security of your IT infrastructure is mandated by federal regulation, as it is for other industries as well. To assure you that Jenaly Technology Group maintains the highest skills and standards for network security, we are a proud holder of the CompTIA Security Trustmark.
You may want to click on the CompTIA Security Trustmark logo below to learn more about this important validation of our security credentials, or read on to learn more about why this is important for your business and your IT partner.
Jenaly Technology Group is the first IT company in the world to attain the CompTIA Security Trustmark, earning it in August of 2008. Click thumbnail image below to read CompTIA's Case Study about our attainment of the Security Trustmark.
The CompTIA Security Trustmark is a vendor-neutral business level accreditation on security business capabilities and processes. These key areas have been agreed upon by key vendor partners, resellers, and end users in the IT industry to promote generally accepted security practices.
Click the thumbnail to the left to read CompTIA's case study about our attainment and use of the CompTIA Security Trustmark.
The following are the 12 areas within an organization with requirements for the CompTIA Security Trustmark:
- Business Continuity Planning
- Access Management
- Incident Management
- Personnel Security
- Security Awareness and Training
- Data Protection
- Technical Infrastructure
- Partner Management
- Physical/Environmental Security
- Service Delivery
The CompTIA Security Trustmark will cover common security practices and IT technologies. Listed below are a few examples of technical areas that are part of the over 100+ controls required to be in place to achieve the Security Trustmark accreditation:
- Security Process, Protocol and Standards
- Technical employee knowledge/expertise
- Change Management
- Intrusion detection
- Vulnerability assessment detection
- Data encryptions
- Security clearances – background checks
- Physical and hardware security
- Security requirements (permissions, passwords, etc.)
Contact us today and see how you can get a FREE security audit and review.
Learn why Jenaly is the correct choice to manage your networked environment. Also, learn how to schedule a FREE on-site network audit and evaluation to show you how Jenaly can become your true Virtual IT Department!
Click here to learn more >