The defense of digital information and IT assets against internal and external, malicious and accidental threats.

Security is the defense of digital information and IT assets against internal and external, malicious and accidental threats.

This defense includes detection, prevention and response to threats through the use of security policies, software tools and IT services.

Security is critical for enterprises and organizations of all sizes and in all industries.

Weak security can result in compromised systems or data, either by a malicious threat actor or an unintentional internal threat.

Not meeting security standards that are regulated by a separate organization or law, such as PCI DSS 3.0 or HIPAA compliance, can also result in financial penalties.

Physical security

Physical security is the protection of personnel, hardware, software, networks and data from physical actions, intrusions and other events that could damage an organization.

This includes natural disasters, fire, theft and terrorism, among others.

Physical security for enterprises often includes employee access control to the office buildings as well as specific locations, such as data centers.

An example of a common physical security threat is an attacker gaining entry to an organization and using a USB storage drive to either copy and remove sensitive data or physically deliver malware directly to systems.

Threats to physical security may require less technical savvy on the part of the attacker, but physical security is just as important as information security.

Information security

Information security, also called infosec, encompasses a broad set of strategies for managing the process, tools and policies that aim to prevent, detect and respond to threats to both digital and nondigital information assets.

Infosec includes several specialized categories, including:

Application security - the protection of applications from threats that seek to manipulate application and access, steal, modify or delete data.

These protections use software, hardware and policies, and are sometimes called countermeasures.

Common countermeasures include application firewalls, encryption programs, patch management and biometric authentication systems.

Cloud security - the set of policies and technologies designed to protect data and infrastructure involved in a cloud computing environment.

The top concerns that cloud security looks to address are identity and access management, and data privacy.

Endpoint security - the part of network security that requires network devices nodes to meet certain security standards before they can connect to a secure network.

Nodes devices include PCs, laptops, smartphones and tablets.

Endpoint security also extends to equipment like point-of-sale (POS) terminals, bar code readers and IoT devices.

Internet security - the protection of software applications, web browsers and virtual private networks (VPNs) that use the internet.

Using techniques such as encryption and internet security aim to defend the transfer of data from attacks like malware and phishing as well as denial-of-service (DoS) attacks.

Mobile security - the protection of portable devices, such as smartphones, tablets and laptops.

Mobile security, also known as wireless security, secures the devices and the networks they connect to in order to prevent theft, data leakage and malware attacks.

Network security - the protection of a network infrastructure and the devices connected to it through technologies, policies and practices.

Network security defends against threats such as unauthorized access, and malicious use and modifications.

Related Proficiencies

[object Object]

Amazon Cognito

Simple and Secure User Sign-Up, Sign-In, and Access Control

[object Object]

Amazon Guard​Duty

Intelligent threat detection and continuous monitoring to protect your AWS accounts and workloads

[object Object]

Amazon Inspector

Automated security assessment service to help improve the security and compliance of applications deployed on AWS.

[object Object]

AWS CloudTrail

Record AWS API calls for your account and have log files delivered to you

[object Object]

AWS Config

AWS Config is a service that enables developers to assess, audit and evaluate the configurations of their AWS resources.

[object Object]


Securely control access to AWS services and resources for your users

[object Object]

AWS Shield

AWS Shield is Managed DDoS Protection for platforms and services built on AWS.

Give us a try free for 30 days!

Don't take our word for it. New clients get to try our services free for 30 days.

We'll put together a team of analysts, developers and designers to partner with you and get to work.

To get started, just fill out the form below.

They show a passion for understanding our business objectives

They show a passion for understanding our business objectives

They get the job done on time and are quite adept at using open source technology, which saves us money. Gunner balances pragmatism and perfectionism, which is important to us. After using them for both short term and long term projects, we cannot give a higher recommendation

Sam Petteway - CEO

5348 Vegas Drive
Las Vegas, NV 89108
GSA: GS-35F-306GA | CAGE: 7Q6F5 | DUNS: 078818362
© 2020 Gunner Technology
Privacy Policy | Terms of Use