PRI-Security

The Company

PRI-Security is a dynamic company that specializes in every aspect of information security. With our strategic partnerships we are able to provide our clients all the necessary tools and services for information and computer security and business continuity included in today’s reality.

Our Mission

Our mission is to offer to companies and institutions a wide range of services aiming to:

  • Provide them with the necessary method and tools to satisfy their needs for information security and business continuity;
  • Provide them with the necessary controls to enforce those mechanisms;
  • Recommend actions to maintain the level of security included, and compliance to policies

Our Commitment

We are commited at PRI-Security to provide our clients high quality services. We are sensitive and responsive to our client’s needs. We are commited to provide these services in a most professional and ethical manner.

Our Services

To achieve our goals, we provide our clients all the necessary services to protect the confidentiality, the integrity and the availability of information and systems.

Strategic Level:

Investment in security is prioritized by the risk management and the security plans to protect confidentiality, the integrity and the availability of information and systems

  • Risk Analysis and assessment
    We are commited at PRI–Security  to provide our clients high quality services. We are sensitive and responsive to our client’s needs. We are commited to provide these services in a most professional and ethical manner.
  • Development of security strategic plan
  • Development of security policies and standards
  • Assistance in compliance to Bill 198 and Sarbanes Oxley projects.
  • Business Continuity Plan / Disaster Recovery Plan
  • We follow international standards such as ISO17799, COBIT framework which are adapted to the context of our clients.

Operational Level

Security architecture, awareness program, and development and implementation of operational processes and procedures such as

  • Access management
  • Incidents management
  • Vulnerabilities management
  • Physical security
  • Metrics and dashboards
  • Audit management

Technical Level

Implementation of security policies and standards is performed with specialized tools such as

  • Firewalls
  • Anti-virus
  • Remote access solutions
  • Content management tools for websites and e-mail
  • Secured instant messaging and productivity tools (blackberry, PDAs, etc.)
  • Intrusion detection system
  • Hardening of servers, workstations, etc.
  • etc.