We help clients protect information, infrastructures, applications and key business processes against internal
and external threats, while enabling new growth and innovation by managing risks.
|
The main value consultants bring
to the table is an objective approach to the issues and problems that are being encountered, and to provide solutions to those
problems that are based on practical, real-world experience, and not merely theory. We at Advanced Information Solutions,
Inc. believe the above statements to be absolute. We feel that you do not have to be a “Big Five” consulting
company in order to provide quality advice or guidance. We treat every project as if it were our own; we provide
the highest quality service at the lowest cost; and we do not merely look at a project as a revenue stream. We determine
how long we need to be engaged, and do not stay longer than projected—you do not hire us to be a permanent part of your
landscape. Our company is led by Michael Daveler, a visionary, goal-oriented Senior IT Security Executive with a 25+ year managerial,
security and technical background. Mr. Daveler has been involved in numerous projects,
including: - Serving as an interim CIO/CISO for multiple clients where he managed teams and daily/strategic
projects and performed many other management duties,
- Performing investigations of confidential information compromises with successful
incident handling and hands-on forensic examinations using EnCase forensic software and other incident handling
methods,
- Performing
compliance and regulatory assessments including SSAE-16 SOC, PCI Level 1 and SAQ preparation, and HIPAA compliance,
- Performing hands-on security vulnerability
assessments/audits/penetration tests,
- Installing
and upgrading computer networks and infrastructures, including designing secure Active Directory domains, wireless access,
remote VPN access, and other design offerings.
Find out more by viewing our About Us page, then look at our "Services" pages for more details on how we can
help design, build and secure your infrastructure.
|