ERE Information Security Auditors
Home | Site Map | Contact Us | Cyber Security News | Resource Center
This text is replaced by the Flash movie.
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Physical Security Audits

During the course of conducting technology and compliance audits, ERE security consultants often identify physical security problems which could lead to the compromise of information: confidentiality, availability or integrity.

We Address Common Areas of Concern

  • Visitor identification and sign-in policy.
  • Physical access controls and challenge response.
  • Motion detection and monitoring in computer rooms and access routes to computer rooms.
  • Enforcement of physical security policy, such as leaving doors propped open.
  • Monitoring of event logs of video surveillance, electronic card access, and other challenge response controls.
  • Location of workstations and printers with access to confidential information.
  • UPS and generators, fuel availability.
  • Plumbing proximity IT technology.
  • Air conditioning and air quality.
  • Fire, smoke, and heat detection.
  • Fire suppression.
  • Physical security policy and policy enforcement.

Photographic Documentation
ERE photographs evidence of physical security violations.  The photographs are compelling evidence and often prompt senior executives of both large and small enterprises to action.


 
 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Daily Cyber Security News
 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | | Cyber Security News | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button