Cyber Security

As your trusted security advisor, ACE IT Solutions’ Security Services provide a simple and cost-effective way to limit potential threats, meet compliance regulations and protect sensitive data 24×7.

When it comes to IT security, one size does not fit all. ACE IT Solutions and our cybersecurity business partners are experts at assessing and managing risk. Through services customized to meet your organization’s needs, we can help identify areas of potential risk, and then design a complete security solution that balances security priorities with regulatory compliance and the amount of acceptable risk your organization can assume.

We’ve structured our cybersecurity program to stay ahead of -- and effectively respond to -- cyber threats and their diverse, multi-faceted attacks. ACE IT Solutions highly-effective security services and tools that can be mixed and matched according to each business’ specific needs.

Security Assessment

Understanding your organization’s security state and identifying vulnerabilities are the first steps toward protecting the confidentiality, integrity and availability of critical data.

ACE IT Solutions’ security assessment provides a comprehensive evaluation of an organization’s existing security policies, procedures, controls and mechanisms in relation to best practices and industry standards. Our security experts will identify risks and outline specific, actionable steps to improve the business’ overall security posture.

  • Evaluates current information security posture
  • Identifies vulnerabilities and determines gaps in the information security environment
  • Helps protect the confidentiality, integrity and availability of critical data
  • Provides recommendations for mitigating identified risks based on the globally recognized ISO 27002 standard and industry best practices
  • Leverages a proven methodology that includes interactive information gathering sessions, process and mechanisms assessments, vulnerability scans, and manual testing and review
  • Supports efforts to comply with government and industry regulations

Includes:

  • Onsite visit
  • Interviews with current stakeholders 
  • Network Security Policy Review
  • Onsite / Hosted Applications
  • Firewalls – network device config review
  • Router / switches – network device config review
  • VPN devices – network device config review
  • IDS/IPS Devices – network device config review
  • Class C internal / external network Vulnerability Testing
Penetration Testing

Penetration testing offers the most effective way of rapidly identifying your network’s most serious security risks and prioritizing remediation efforts. Penetration testing is used to identify which current security protocols are effective. Hedge funds and financial services use penetration tests to prove to regulators and investors that a business’ systems have been tested and are secure.

In partnership with the security experts at IBM X-force, the authority in vulnerability and threat research, ACE IT Solutions tests a business’ network and security protocols using a safe and controlled technique. The result is a report that lists detailed findings in order of criticality and provides specific guidance and recommendations for reducing exposure. We can help prioritize the discovered risks, determine the steps required to improve security and deploy them in a cost-effective and efficient manner. 

We provide skilled consultants who draw from extensive experience manual investigation techniques and advanced tools to identify and exploit vulnerabilities. We facilitate consistent assessment, design, deployment, management, support and education services to enhance your return on investment. The penetration testing methodology can include:

  • Network discovery and reconnaissance—Extensive inspection of online hosts and services
  • Perimeter or internal attack—Exploitation of key vulnerabilities
  • Remote exploitation—Attempt to further penetrate the network and breach valuable or confidential data
  • Findings and analysis deliverables—Detailed report including findings and actionable recommendations

IBM security consultants have expertise gained from corporate security leadership, security consulting, investigative branches of the government, law enforcement, and research and development. Our consultants are supported by the IBM X-FORCE™ research and development team. IBM combines industry-leading security assessment tools with in-depth manual exploitation techniques and analysis of vulnerabilities to build a customized security program designed to enhance your business operations.

Vulnerability Testing

Understanding your organization’s security state and identifying vulnerabilities are the first steps toward protecting the confidentiality, integrity and availability of critical data. These steps are also integral to regulatory compliance efforts. 

Security assessments, offered in partnership with IBM, provide a comprehensive evaluation of an organization’s existing security policies, procedures, controls and mechanisms in relation to best practices and industry standards, such as ISO 27002. The IBM Information Security Assessment is performed by security experts that identify risks and outline specific, actionable steps to improve the overall security posture or your organization.

Highlights:

  • Evaluates current information security posture
  • Identifies vulnerabilities and determines gaps in the information security environment
  • Helps protect the confidentiality, integrity and availability of critical data
  • Provides recommendations for mitigating identified risks based on the globally recognized ISO 27002 standard and industry best practices
  • Leverages a proven methodology that includes interactive information gathering sessions, process and mechanisms assessments, vulnerability scans, and manual testing and review
  • Supports efforts to comply with government and industry regulations

Our security assessments cover every corner of your network, from infrastructure to applications to devices:

  • Internal network vulnerability test
  • External network vulnerability test
  • Wireless security assessment
  • Database vulnerability testing
  • Application vulnerability testing
Managed IDS/IPS

Because catastrophic Internet attacks can disrupt a business’ operations, top-flight security expertise is more valuable and essential than ever before.

Our managed IDS & IPS Services are designed to provide comprehensive protection for networks and servers against threats and unauthorized intrusions from both internal and external sources at a fraction of the cost of traditional solutions.

  • Provides comprehensive protection for networks and servers against threats and unauthorized intrusions from internal and external sources
  • IBM IDS/IPS solutions deliver 24×7 expertly monitored and managed intrusion detection and prevention systems that help keep your networks and critical applications protected
  • Allows for real-time, automated analysis and correlation of events, supporting accurate and proactive identification of malicious behavior
  • Provides rapid, cost-effective resolution of security issues to help safeguard the security of your company
  • Helps to not only reduce risk but also improve industry-specific regulatory compliance by providing real-time views into your security posture
SIEM - Security Information and Event Management

Security Information and Event Management (SIEM) offers cost-effective cyber protection for organizations seeking to safeguard their intellectual property, protect their customer identities and avoid business disruptions.

ACE IT Solutions’ SIEM, powered by IBM, consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. Without centralized log aggregation and event correlation, it is impossible to properly defend your network.

Benefits of SIEM:

  • Provides near real-time visibilityfor threat detection and prioritization, delivering surveillance throughout the entire IT infrastructure.
  • Reduces and prioritizes alerts to focus investigations on an actionable list of suspected incidents.
  • Enables more effective threat management while producing detailed data access and user activity reports.
  • Supports easier, faster installation and includes time-saving tools and features.
  • Produces detailed data access and user activity reports to help manage compliance. SIEM provides the transparency, accountability and measurability critical to an organization’s success in meeting regulatory mandates and reporting on compliance.
  • Offers one of the industry’s highest service level agreements (SLAs)for uptime and availability, providing rapid, significant value beyond data collection, correlation, analysis and reporting

ACE IT Solutions partners with IBM to offer SIEM. IBM Security QRadar SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. As an option, this software incorporates IBM Security X-Force®\ Threat Intelligence which supplies a list of potentially malicious IP addresses including malware hosts, spam sources and other threats. IBM Security QRadar SIEM can also correlate system vulnerabilities with event and network data, helping to prioritize security incidents.

Risk Management & Compliance

Managing risk to information security is a tricky business. Too much protection can overburden IT staff and budgets, while too much risk can expose your organization to data theft, system downtime, fines, loss of customer trust and even bad publicity.

Our Risk Management and Compliance services help businesses evaluate their existing security practices—including payment card industry (PCI) security, identity and IT regulatory compliance needs and gaps— against their business requirements and objectives to help business leaders make more informed decisions about allocating resources to better manage security risks and compliance.

  • Identifies gaps in your business’ security program
  • Provides detailed recommendations for ongoing conformity
  • Experts provide help with implement security best practices and recommendations to help clients make informed decisions about allocating resources to better manage security and compliance needs
  • Develop actionable plans for optimizing IT resources and better managing compliance
  • Identify areas of potential risk and design a solution that balances risk mitigation against acceptable levels of assumed risk
  • FISMA compliance
  • GLBA compliance
  • PCI compliance
  • NERC-CIP compliance

When it comes to IT security, one size does not fit all. ACE IT Solutions and IBM Security Consultants are experts at assessing and managing risk.

Through services customized to meet your organization’s needs, we can help identify areas of potential risk, and then design a complete security solution that balances security priorities with regulatory compliance and the amount of acceptable risk your organization can assume.

Security Intelligence Analyst

Security intelligence analysts work with clients to analyze their current security posture, review trends in the client’s environment and provide policy tuning and strategic recommendation.

Benefits & Features

  • Help understand and prioritize vulnerabilities
  • Provide deeper insight regarding security technologies
  • Help keep clients up on security trends in order to anticipate changes and plan accordingly
  • Provide quick and detailed security advice to clients under attack
  • Help interpreting security data and adjusting security device policies in response to security events
  • Provide analysis of daily security events and prioritization of security efforts
  • Monthly vulnerability scan results help prioritize remediation efforts
  • Supports compliance efforts
  • Regular client briefings
  • Dedicated security support
Emergency Response

IT security breaches can have devastating consequences for any business, resulting in operational disruption, data leakage, brand and reputation damage, and regulatory complications. Our security experts are there for you when you have a security incident and need troubleshooting and remediation assistance.  Our IT emergency response services can help you quickly respond to and recover from a computer security breach by giving you 24×7 access to our experts.

  • Emergency response services provide a methodology designed to help manage incident response across multiple stages including prevention, intelligence gathering, containment, eradication, recovery, and compliance.
  • Proactive, preventive approach is informed by threat intelligence and helps businesses understand how to prevent it from happening again
  • Response preparation helps with quick recovery
  • Gap analysis helps uncover holes in existing security approach and remediates them
  • 24×7 emergency response analysts stop attacks in progress, reducing the impacting and helping with a quick recovery
  • Subscription-based services can be utilized remotely or on-site for unlimited emergency declarations
  • We can provide documentation and reports about the incident

Visit the IBM Data Breach Risk Calculator to find out how much a data breach will cost your organization.

View the PDF info sheet 

PCI

Our cloud-based vulnerability management and PCI scan service

  • Helps manage compliance with security initiatives by scanning for and classifying vulnerabilities
  • Provides remediation steps and data to assess and manage security risks to help reduce threat exposure
  • Helps reduce cost and complexity of security maintenance through IBM cloud security services

Our PCI solutions, offered in partnership with IBM, support your efforts to evaluate your current readiness for PCI assessments, remediate findings, and implement strong controls to help you maintain a consistent PCI compliance environment.

Managed Network Security (MSS)

Network security is top priority for any organization. Internet threats to systems and data can impede business innovation, limit productivity and damage compliance efforts. You need preemptive threat mitigation solutions that protect your entire IT infrastructure.

Our managed security services, offered in partnership with IBM:

  • Helps reduce costs and manage regulatory compliance with streamlined security management processes
  • Provide network security solutions to protect endpoints, applications, systems and networks
  • Uses IBM best practices to deliver an expertly managed network security system
  • Provides web-based management portals that eliminate the need for manual data analysis and reduce IT complexity

Our managed security services, offered in partnership with IBM, deliver the industry-leading tools, technology and expertise to secure your information assets 24x7.

Critical Data Protection (CDP)

Data security services incorporates a risk-balanced strategy along with leading data protection technology to more cost effectively help safeguard your organization’s critical data. We help optimize your level of control by providing both consulting services to establish your data protection strategy and implementation and integration services using market-leading loss prevention and encryption technologies.

  • Apply adequate data protection measures in order to mitigate risks, deter attacks and comply with requirements
  • Designed to protect the IT infrastructure, the networks, the devices, the data and the access—is ultimately about the secure continuous flow of vital information
  • Effective encryption is combined with monitoring, access control and identity management
  • Provide access to data and tools authorized users need, when they need them, while blocking unauthorized access
  • Identify and fix root causes of non-compliance and focus strong protection around critical data
  • Help establish internal controls to promote ongoing compliance in accordance with cloud and mobility platforms
  • Discovers where critical data resides, on what devices and whether it is structured or unstructured
  • Prioritizes the critical data that, if stolen, would cripple the organization
Managed Firewall

Monitoring and managing your firewall is crucial to safeguarding your organization’s security. Our Managed Firewall Services, offered in partnership with IBM, provide customized, around-the-clock firewall protection at a fraction of the cost of traditional solutions.

  • Simplified, flexible pricing model
  • Customized to your needs
  • Standardized and customizable reporting
  • 24 x  7 Monitoring and management
  • Ongoing maintenance and patches
Information Security Plans and Policy Development

ACE IT Solutions works closely with clients to outline, document and develop cybersecurity policies to ensure confidential data is protected and SEC requirements are met. Our security policy planning and development services help clients rapidly create and deploy comprehensive security policies, standards, guidelines and operating procedures designed to align with best practices and satisfy regulatory compliance requirements. As part of the services, our security experts evaluate clients' existing policies and practices to help ensure documentation is developed in accordance with business goals as well as the ISO 27002 framework for information security management.

We also conduct information security plan audits of existing documentation to ensure your business is protected against the ever-evolving security threat landscape.

  • Information security policy
  • Incident response planning
Identity Management and Access Control (IMAC)

ACE IT Solutions' identity and access management solutions, delivered in partnership with IBM, help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.

Our identity and access solutions help safeguard valuable data and applications with context-based access control, security policy enforcement and business-driven identity governance. Armed with user metrics and audit reports on user entitlements and access activities, you can deal more quickly and efficiently with the complexities of user access management, insider threats and compliance requirements.

Identity and access management solutions from IBM help:

  • Safeguard mobile, cloud and social access.
  • Prevent advanced insider threats.
  • Simplify cloud integrations and identity silos.
  • Deliver actionable identity intelligence.
Phishing Test / Security Awareness training


91% of successful data breaches started with a spear-phishing attack

Reduce the likelihood that an employee in your organization will compromise the security of your data. ACE IT Solutions phishing security testing allows you to find out what percentage of your users is Phish-prone.

Send a simulated phishing attack to your users and learn who is susceptible to opening emails or attachments. Test metrics reveal which users are putting your security at risk how many potential incidents would have happened had the exercise been a real attack. Use these findings as a way to discuss the growing security threats with employees and train your most phishing-prone users.

ACE IT Solutions' simulated phishing tests give you measurable control over your "human firewall". Contact us for details and pricing for Phishing Testing.

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions at 646.558.5575 for more details about how you can address cybersecurity challenges in your business. We will make sure you are investing properly in cybersecurity technology.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.