Let's start the conversation

Computer security can be a scary thing. If you just have a quick question, feel free to drop Dan a line.

Send
The Informer by Dan Griffin
✕
  • Publications
  • Blog
  • Contact

Application & Infrastructure Security featuring

The Four Pillars of Endpoint Security

 
Using our proprietary The Four Pillars of Endpoint Security®, JW Secure offers security assessments for network infrastructure and software source code in order to help you protect your business-critical technology.

Few IT shops can afford to match the resources of online attackers who may be supported by organized crime or even governments.

More about our Enterprise Security Assessment service is available in our summary here.

With JW Secure at your side, your IT infrastructure and development teams can focus on what they do best, while also giving you the assurance that they are implementing secure, dependable solutions. Summary of the Enterprise Security Assessment:

  • Offering industry-leading network infrastructure, threat modeling, and data flow analysis expertise
  • Providing intimate knowledge of key Microsoft technologies, straight from the people who helped develop them in the first place
  • Performing penetration testing and code auditing for your business-critical technology to identify flaws and suggest alternatives
  • Designing test automation scripts for your secure solutions
  • Suggesting and helping you implement best practices for writing more secure code
  • Designing and helping you implement a software development methodology that ensures that security is top-of-mind for your entire development staff

Related posts:

  1. Security Design & Code Review
  2. Network Infrastructure Development
  3. Systems Engineering & Development
  4. Strong Authentication

Services we provide

Our services include, but are not limited to:
 
• Application & Infrastructure Security
• Systems Engineering & Development
• Data Protection
• Network Access & Identity
 
More about our services is available in our one page summary of services.

Recent posts:

  • jwsecure_blog_imagery_linux
    Implementing Platform Protection for Linux February 7, 2017
  • jwsecure_blog_imagery_hybrid
    Enterprise IT Security Unlocks the Potential of Hybrid Cloud December 1, 2016
  • jwsecure_blog_imagery_coveringthebases
    Covering the IoT Security Bases: Device Identity, Anti-Tampering, and Key Management October 7, 2016

Dan Griffin’s Books:

The Four Pillars of Endpoint Security
(CreateSpace – June, 2013)
Cloud Security and Control
(CreateSpace – May, 2014)

Search:

CONTACT INFO

JW Secure, Inc.
1752 NW Market St.
Suite 227
Seattle, WA 98107-5224
 
sales@jwsecure.com  
Copyright 2017 JW Secure, Inc. All rights reserved. Site design by Page 3 Design.