Our Approach to Security Technology
"Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat."
At NuHarbor Security we take pride in being a full security lifecycle provider. We understand that a well-designed Information Security Program without the tooling and tactics to implement the strategy cannot be operationally successful. Conversely large investments in security technology and massive implementation efforts without alignment to a program strategy amount to nothing more than busy work and lost dollars. We take a strategic approach to our security technology sales and integration services by working with our clients to understand their organization and their Information Security Program roadmap. If a security technology does not align with a client’s organization or roadmap, it will not be recommended. After the sale, our professional services are focused on integration of the technology not only into the Information Security Program but also into the organization’s Enterprise Architecture. We stay connected with our clients after integration services are complete to ensure they are gaining value from the solution and offer Tune Up & Health Check Services to keep things running in top form and aligned to strategy. Contact us today for help acquiring and integrating the tactical solutions required to give your security strategy the quickest route to victory. Have an area of need you don’t see in our current partner catalog? Let us know. We are constantly managing and evolving our partner portfolio to best address the needs of our clients.
Selection & Sales
A piece of security technology can’t just be the right piece of technology, it needs to be the right piece of technology for your organization. At NuHarbor Security we are very selective about our partner technology portfolio. If we don’t believe in the capabilities of the product and the dedication of the company to the betterment of information security, we won’t carry the partnership. Even with that level of confidence in our partners we won’t recommend every product we carry to every customer. The technology must address your organizational needs and, just as importantly, must fit within your Security and Enterprise Architecture.
It is the goal of our sales organization to become a trusted adviser for our clients in identifying new security technology. The only way to achieve that goal is to become intimately familiar with our clients Security Architectures and organizational priorities. We require our sales staff to think and act as a member of our client organizations when identifying security technology solutions. As a result we are able to recommend solutions with a much higher rate of success on achieving objectives and being successfully integrated. As a bonus from our sales staff’s familiarity with client needs, we are able to be more proactive with technology solution identification. We bring the needs of our clients to existing partners for product evolution and seek out new partners where solution gaps exist. For our clients it all boils down to a simplified solution identification and procurement process with a high confidence of success.
At NuHarbor Security we very purposefully use the term “integration” in favor of “implementation.” Far too many firms offer simply technology implementation. A piece of security technology implemented in isolation of organizational needs and technology architectures brings very little value to your security program. You will never receive a basic “we just followed the manual” install from NuHarbor Security.
Our Security Engineers are not only technically savvy but also versed in Information Assurance best practices and principles. Our engineers understand not only how to use the technology but more importantly why. During professional services engagements our Security Engineers will work with you to understand your Information Security Program and integrate your new security technology into that program. Our Security Engineers are also knowledgeable and experienced in the realms of architecture, development, and operations and are able to deliver solutions contextually within an enterprise architecture to provide value without impediment.
Tune Ups & Health Checks
Do you have a piece of security technology in need of some attention or a piece of kit you’d just like to be sure is running in top form? During a Tune Up Service we’ll make sure the technology is fully updated and functioning properly. More importantly, we’ll work with you to understand your original goals for the technology, how it has satisfied those goals to date, and any organizational changes to goals or priorities. That knowledge will be combined with NuHarbor Security’s understanding of the latest threat landscape to ensure the technology is not only functioning correctly but also addressing your organizational needs.
Recent Blog Posts
If you are a member of your organization’s executive team, then you are likely well-versed with various information security responsibilities, either by choice or by regulation. If your organization is in the private sector, then within this suite of responsibility...
Are you shopping for a comprehensive security assessment, but would like to know what you’re in for before starting? In this post, we’ll break down the process, using an example NIST 800-53 security assessment, so you can determine whether you think you’re ready now,...
NIST 800-53 Rev 5 is on the way, have you read the draft? We regularly use NIST 800-53 as the criteria for controls assessment for both private and public-sector clients. With our guidance, many of our clients have successfully implemented an industry-appropriate risk...
Overview Thanks for taking a few minutes to read our post onboarding custom data into Splunk. For support with Splunk or Splunk Managed Services please contact us here. This guide is to help Splunk Admins onboard new data that do not have a Splunkbase TA available. ...
Third party security assessments are a crucial part of any information security risk management program. Conducting ongoing security assessments of your vendors will give you clarity on the risks you may be inheriting from them. The first step in any vendor security...