Security Risk Assessment

ISO-based Security Assessment

Using questionnaires, interviews, physical security walk-thru, documentation review, network architecture topology reviews, external port scans, vulnerability scans and penetration testing, the ISO-based assessment provides a more comprehensive view of the overall security of an enterprise.

Risk Assessment and Compliance Audits

Once a full risk assessment has been completed, a baseline has been established, and its findings implemented, the customer should consider periodic audits to ensure compliance with an organization’s published information security policies and procedures. Networks are dynamic, and changes take place almost daily. Security audits are as necessary to an organization’s well being as its annual financial audits. This external audit will help to make certain that the systems and network remain secure in light of the system and architectural changes. Talon offers Basic and Advanced security audits.

Protecting people, property and profit
(800) 505-6977 • (651) 774-6977


This site designed by Warneke Design.