Security Solutions

Compliance (HIPAA, GLBA, SOX), DR/BCP, Risk Assessments, Antivirus Applications, VPN

Network Engineering & Operations (Voice/Data/Video)

LAN/WAN design, remote monitoring and access solutions, technical evaluations

Systems Management

Server administration/hosting, disaster recovery, performance analysis, storage solutions

Desktop & Help-Desk Support

Break/Fix, configuration, procurement, moves/adds/changes

Interim Staffing

CIO, Sales, Technical Outsourcing

Contour's IT professionals are certified and experienced in the areas that are critical to your organization's success.

In today's economy, business as usual is no longer a viable competitive option. Contour has been helping customers improve business performance, develop strategies or solve technical problems by offering a full spectrum of support services. These services provide our clients with the flexibility to pick and choose what fits their technical and/or business requirements.

Information is your company's most critical asset. Consider the implications to your firm if your customer or corporate information was compromised or inaccessible. The results would range from merely embarrassing to severely damaging to your firm's ability to exist. According to the 2004 Computer Security Institute and the Federal Bureau of Investigation annual study, total annual losses from computer security incidents reached $141 million in 2004, with viruses alone accounting for $55 million. In a shift from previous years, 25% of respondents report outsourcing a portion of their Information Security Function, according to the CSI/FBI report. The Gartner Group predicts that over half the companies that manage their own network security and use the Internet will be hacked and more than 60% will be unaware of the attack until long after the damage has been done.

Clearly the need to reinforce and monitor your company's security processes and procedures has never been greater. At Contour we offer fully customizable security products to meet the unique requirements of your organization. Contour employs certified security experts with extensive knowledge in the following areas:

  • Compliance (HIPAA, GLBA, SOX)
  • Security Audits - host/network risk assessment, identify options & policy improvements
  • Security monitoring – fully managed monitoring and management in our Security Operations Center (SOC)
  • Virus Protection - 3 tiered architecture protecting desktops, servers and gateways
  • Firewall Solutions - integrated applications, providing access control & secure Internet communications
  • Network Security - PKI, VPN, router & remote access solutions
  • Intrusion Detection - full-featured, best-of-breed appliance evaluation and implementation
  • High Availability Infrastructure - provide economical, continuous availability
  • DR/BCP – full range of Disaster Recovery and Business Continuity Planning services