Category Services

PCI-DSS Audits

SACS helps client achieve and maintain a level of PCI-DSS regulatory compliance that ensures the protection of sensitive data, customer information, brand reputation and technical requirements.

We offer a range of PCI services including:

  • Annual Report on Compliance (ROC)
  • Annual Self-Assessment Questionnaire (SAQ)
  • Compliance Gap Assessment
  • Network and Application Penetration Testing
  • Code Review

For more information send an email to SACS PCI Services

Read More

Persistent Threat Matrix Management – SaaS

Persistent Threat Matrix

SaaS (Software as a Service)

SACS (Security, Audit and Control Solutions) Threat Matrix Management SaaS solution provides IT Security, Audit, Fraud Management as well as senior management with a complete management and monitoring solution.  This includes:

  • Asset Management
  • Human Resources Integration
  • Continuous Vulnerability Scanning with a control framework
  • Management Information System (MIS) Reporting
  • Dashboard Access
  • Infrastructure monitoring
  • Education and Training Framework

For more information please send email SACS SaaS

Read More

IT & Compliance Audits

Even small networks and business infrastructures can become very complex and is susceptible to ‘Baseline Shifting’.  The ISO 2700x standard has been defined and adapted for Information System Security Management (ISMS)

Read More

Digital Forensics

Digital Forensics

Digital Forensics is an ‘art’ to obtain digital evidence in a secure manner within a timeframe that may erode the admissibility.  Our objective with any case is to perform secure evidence collection, victimology and reporting based on the evidence and potential evidence.  This process needs to be done within an acceptable timeframe with many factors that have to be taken in consideration as they may introduce ‘artifacts’ into the evidence.

Security Audit and Control Solutions (SACS) has more than 10 years experience in search and seizure, digital evidence collection, first responder, and low level data analysis.  We get onsite with our own equipment and start collecting and documenting evidence

Disparate systems such as web servers, mainframe data, workstations, PDA’s,...

Read More

Penetration Testing

SACS Penetration testing

Are you aware of what is happening in your Enterprise Network?

Penetration Testing (Pen-Test) is a practice to test your security by using the same techniques a hacker would you to compromise your network or devices.  One of the best ways to measure the vulnerability to your systems either for malicious attack of perpetrating a fraud is to have an independent systems security professionals try and compromise your system.

We arrive with all the required equipment at your site and can be up and running as soon as the change control has been approved.  Commercial, open-source, and internally developed tools are used to perform the controlled attack while logging and monitoring responses...

Read More

IT Audit

IT Audit

Read More