IT security systems and software have never been more important to today's effective business operations. From data protection, encryption, external and internal threat protection, businesses today depend heavily on these systems. But systems and software programs are only as good as the people who create, administer and manage them.

Finding the right people to fill IT security and security management positions is essential to staying competitive and operating securely, legally and ethically. Creek Systems has the professionals with the credentials, skills, education and experience to fill your IT Security openings.

We enumerate IT Security in a framework that is based on the five general categories of controls related to the security service or functionality that available technologies provide:

bullet

Access controls restrict the ability of unknown or unauthorized users to view or use information, hosts, or networks.

bullet

System integrity ensures that a system and its data are not illicitly modified or corrupted by malicious code.

bullet

Cryptography includes encryption of data during transmission and when stored on a system. Encryption is the process of transforming ordinary data into code form so that the information is accessible only to those who are authorized to have access.

bullet

Audit and monitoring help administrators to perform investigations during and after a cyber attack.

bullet

Configuration management and assurance help administrators view and change the security settings on their hosts and networks, verify the correctness of security settings, and maintain operations in a secure fashion under conditions of duress.

Creek Systems provides the Information Technology Security talent our clients require quickly and efficiently. Your organization can attain the expertise needed with confidence and know your systems and software are in the best possible hands. We provide top-notch professionals in multiple capacities and areas of expertise as detailed below:

Chief Compliance Officer Information Security Sys/App Architect
Chief Information Security Officer Information Security VP/Director
Chief Security Officer (CSO) Internal Auditor
Computer Security Specialists Security Administrator
Cryptologist Security Analyst
Data Recovery Planner Security Auditor/IT Auditor
Data Security Administrator Security Engineer
Data Security Analyst SOX Auditor
Director/VP/Manager of Security Sr. Security Administrator
Information Security Manager AND MORE...

For more information about our services, complete this online form and a client relationship manager will contact you immediately.

Below is a non-exclusive selection of technologies Creek Systems consultants utilize.    Expand all | Collapse all

Firewall
Intrusion Detection Systems
AccessMaster NetWall
BorderManager
BorderWare
Cisco
CyberGuard
Cyberoam
CyberwallPLUS
Drawbridge
FireProof
FireSTAR
Firewall
Fwconfig
GNAT Box
Guardian Firewall
HP Praesidium e-Firewall
Interceptor Firewall Appliance
IPACL
KnightSTAR
KryptoWall
Lucent Managed Firewall
NetWall
SafeSquid
SecureCom
ServerGuard
Sidewinder Security Server
SmartWall
SonicWALL
SmoothWall
STARLord
Tcpr
TIS Internet Firewall Toolkit
Trusted Gate
WebGuard
AnaDisk
AuditTrack for Netware
Authd
BlackICE Defender
bv-LifeLine
Check Point RealSecure
Cisco Secure IDS
Clog
Computer Misuse Detection System
CRCMd5 Data Validation
CyberCop
DesktopSentry
DiskSearch
Dragon Sensor
eTrust Internet Defense
ForensicToolkit
Gabriel
HP Openview Node Sentry
HP-Tcpdump
ICEcap
iD2 Secure Transport
Ifstatus
IP-Watcher
Kane Security Monitor
Klaxon
LSOF
Lucent RealSecure
Netlog
Network Flight Recorder
Patriot IDS
Peek & Spy
QRadar
RealSecure
SafeBack
Sentry
SilentRunner
SMARTWatch
Snort
Strata Guard
Tcpdump
Tripwire
T-sight
TTY-Watcher
Vanguard Enforcer
   
Biometrix
Smart Tokens
5th Sense Fingerprint Reader
ACTAtek
BACS
BioTools
Daon
FPS 200
Identity Assurance Management
KnowWho
Nuance Verifier
PrivateID
SecureTouch 2000
TouchPrint
VKI
ACR38U-CCID
ActiveCard USB Reader V3.0
Alcor Micro AU9520
ASEDrive IIIe USB V2
LTC31-32
SmartTerminal ST-2XXX
SIMPocket Combo
Axalto Reflex USB v3
GemPC433-LS
KAAN Advanced
mIDentity
Cardman
cyberJack PinPad
SecurID SID800
SCR
Sitecom USB
Teo
   
Virtual Private Networks
Computer Forensics Tools
AIX VPN
CeloCom for Citrix Metaframe
Cisco Secure VPN
Defensor
Entrust/Access
Fiberlink
Guardian VPN
HP VPN
IBM Multiprotocol
KyberPASS
NetScreen
Norman Security
PathBuilder S500 Tunnel Switch
Personal Ravlin
PGP VPN Client
Lucent VPN
RapidStream
Ravlin
S9500 Security Appliance
SecureCom
Shiva
SmartGate VPN
Trusted Client/Server
VTCP
WatchGuard Live
BitFlare
CRCMD5
DIBS Forensic
DiskSearch 32
DiskSig
DM
DRIVESPY
EnCase
Evidence Disc Systems
FileCNVT
FileList
ForensiX
FRED
GetFree
IMAGE
GetSlack
KeyGhost
NTAView
NTI-DOC
OnLineDFS
PART
Password Recovery Kit
PDBLOCK
ProDiscover DFT
Seized
PTable
TCT
TextSearch Plus
   
Antivirus Software
Content Management
Antigen
Avast
BitDefender
eSafe
F-Secure
HouseCall
Internet Security Suite
InterScan VirusWall
Managed Virus
Norton
OfficeScan
ServerProtect
PC-cillin
Sophos
Spy Sweeper
Thunderbyte
TVD Management Tools
VFind
Virex
WebShield
Anti-X
Content Advisor
Content Security Server
Cyber Patrol
Cyber Sentinel
Cyber Sitter
Cyber Snoop
eSafe Enterprise
iPrism
LANGuard
Net Nanny
OrangeBox
Screendoor
WatchDog
Websense
WorldSecure ESP
   


[Go Back]