Long before the World Wide Web was available to anyone with a network connection, students and faculty enjoyed free and open communication using a research IP-based network that eventually became today’s Internet.
These data networks are now used by an expanding number of higher education stakeholders who depend on the Internet for teaching, research, healthcare, admissions, alumni giving, email and online classes. These networks contain personal information that must be protected with new security controls in accordance with a growing number of regulations. These include:
- PCI DSS – Protection of payment card information
- HIPAA/HITECH – Protection of student health records or research involving private health information
- GLBA – Protecting financial information
- FERPA – Family Educational Rights and Privacy Act (FERPA) – student records privacy
Sword & Shield Services for Higher Education
We offer proven, practical services that balance compliance requirements with an effective program to prevent security threats.
|Virtual Chief Security Officer||A single point of contact at Sword & Shield who will be your organization’s trusted adviser. The VSCO will work hand-in-hand with your staff to remedy your security and compliance issues and accomplish your long-term goals.|
|Risk & Compliance Shield||Risk & Compliance Shield™ uses a risk-based approach to categorize risks associated with the various applications and networks that store, process and transmit sensitive data by identifying the people, policies, processes and technology associated with business sensitive information.|
|Security Policy Development||Written Information Security Policy documents are a formal declaration of management’s intent to protect information, and are required for compliance with various security and privacy regulations.|
|Security Testing Services||Reduces risks that someone with the intent to do harm could bypass security controls and gain access to sensitive information. Provides verification of security controls and meets independent, third-party assessment requirements.|
|Web Application Testing||Examines the subsystems, components, interactions and security mechanisms of the Web application and identify Web security weaknesses|
|Mobile Application Assessment||Verifies encryption of data stored on mobile devices.|
|Configuration & Hardening Review||Review the OS, external connections, and application-level security. Report our findings with actionable recommendations to improve the policies, procedures, and security controls of your systems.|
|Virtual Infrastructure Assessment||Audit of your virtual infrastructure to include access control, the application of least privilege, data protection, secure network configuration, disaster recovery planning and testing, and threat analysis specific to virtualized environments.|
|Incident Response||Provides rapid response when you suspect someone has compromised PII data on your systems.|
|Forensics Investigations||Reduces workload on the IT department from time consuming electronic investigations and insures that evidence is preserved and admissible in a court of law.|
|eDiscovery||Bridges the knowledge gap between IT and Agency legal department when producing electronic evidence and expert witness in litigation.|
Find Out More
Sword & Shield has been outsmarting cyber-criminals and improving security for enterprises around the world since 1997. Fill out our Consultation Request form or call us so we can begin securing your future.
U.S. Toll-free: 800-810-1885