ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
This text is replaced by the Flash movie.
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Differentiators

Impartial and Vendor Neutral

Confidentiality and Discretion
ERE Security Auditing provides complete discretion and confidentiality. We always offer upfront a bilateral non-disclosure agreement to each perspective client.

Core of Auditing and IT Risk Evaluation
Since ERE Security Auditing engages only in security and privacy compliance auditing and IT Risk evaluation, our team of security experts are 100% focused on our core.

Clear Expectations – Security Audit Checklist
Our proposals contains a fixed price quotation, a detailed statement of work, time and deliverables work flow, a security audit checklist, items out of scope, and a sample audit report.

Executive IT Risk Summary
Each audit report includes a:

Clarity

Wide Scope of Offerings

 

 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

http://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button