Introduction

Just how safe is safe enough when it comes to protecting your (and your clients') information? Are you trusting your business to software that isn’t worthy of your trust? To answer those questions, you must first have a deep understanding of how your software works and how it safeguards your vital business data.

No diving


HOT: Are you a mobile app developer? Concerned about security? Check out our Mobile App Security Triathlon that we’re launching together with Gunnar Peterson (@OneRaindrop).

Too much security can hamper a business and, in the end, be more damaging than not enough security. Reacting to all the latest attacks and vulnerabilities can result in a directionless security strategy that ends up slowing down business instead of helping it.

Here at KRvW, we take a more balanced approach that starts with developing a deep understanding of how things work, and then recommending a course of action that makes sense. We'll help you build, deploy, and operate systems that meet your needs.

Our training offerings are highly specialized courses with a heavy emphasis on hands-on lab time, because technologists learn best by doing. So, we’ve spent years putting together courses that work on such specialized topics as secure iPhone application development, web application security, and intrusion detection systems.

KRvW consultants Ken van Wyk , Rick Forno, and Sean Eidemiller have spent years working with organizations of all sizes helping them answer these sorts of questions in meaningful ways, and putting in place the levels of information assurance that make sense for them and their customers. KRvW Associates has delivered a proven track record of results to our customers since 2003.


Come join us on Facebook and follow our announcements and updates:
KRvW Associates, LLC



We support and use Pasted Graphic 2, and can provide identity assurance service for free. Contact us for details.