We have been delivering IT Infrastructure and Cybersecurity services for over two decades. This is bedrock for our clients. The infrastructure must be high performing and robust, to optimize the client’s performance across all functions. The client must also comply with all applicable data privacy laws and regulations, while ensuring data and systems are as secure as possible. Our multi-disciplinary team includes compliance experts, lawyers, network engineers, and systems engineers…bringing various vantage points and skill sets to bear to see everything and get the job done right.
Infrastructure and Cybersecurity
We offer full or partial managed infrastructure and CISO services, as well as legal & risk management, so your team can focus on pro-growth, big-picture department and organizational goals.
“For business owners and manager, IT is often viewed as break/fix. That is, systems are valued at the start of an enterprise…and then again when there are disruptions that need to be corrected. Otherwise, it’s an afterthought.
This is problematic on numerous levels. The obvious problem being that waiting for a problem to happen is disruptive to operations and often costly when it does. Not to mention the diminished performance of your network over time if you don’t maintain it.
However, the bigger issue is the safety and security of the information contained on your systems. And that’s where Garnet River can help. We can support your staff and fill in gaps with IT infrastructure and security, or we can lead.”
Mike Donnelly, Practice Lead
Celebrating visionaries & integrators on National IT Professionals Day
National IT Professionals Day, celebrated on the third Tuesday of September, is dedicated to recognizing the contributions of information technologist globally.
Post IT Attack Remediation for a Local Government
In need of post IT attack remediation, a local government turned to Garnet River to restructure networks and servers and prevent future attacks.
Vulnerability Testing for an International Chemical Manufacturer
Garnet River’s vulnerability testing helped support international commerce, compliance with international regulatory frameworks, exploit remediation.
Escaping the Siloes and Shadows of State Agency IT Operations
When NYS put EdLaw 2D Part 121 into effect, most school districts scrambled to understand the law and determine gaps. Garnet River developed a program to help.
“Information security is a journey, not a destination. Compliance is not an end state but a checklist that provides direction for the journey. At Garnet River, we help clients navigate this journey. We emphasize the basics, but we complement them with a strong information security program, technical tools, and sound policy…all while mapping progress and remediating issues along the way.”
– Michael D. Weisberg, Chief Information Security Officer
Why Garnet River Infrastructure
We’ve got our head in the clouds…and that’s a good thing. As experts in information technology, infrastructure, security, and modular systems thinking, we provide you with access to a smart, cost-effective alternative to maintaining your networks.
With limited resources, small- to mid-size organizations often have difficulty prioritizing infrastructure and security projects, we offer full or partial managed information technology with bundled or a la carte services. Key benefits include:
- Staff Augmentation. In-house information technology teams can find themselves under enormous stress during busy seasons and periods of growth. Co-management offers a helping hand to maintain delivery, prevent burnout, and preserve morale.
- On-demand Expertise. When your team runs into issues they are not equipped to respond to, a co-managed service provider (MSP) serves as a crucial backup and resource.
- Improved Security & Compliance. Businesses cannot afford to let security and compliance take a backseat. A co-managed service provider offers proactive protection and expertise.
- Enhanced Productivity. Information technology downtime is one of the biggest drivers of lost workplace productivity. Proactively caring for your network and dividing the required responsibility and tasks can boost productivity and ensure employees focus on work that drives business performance.
- Standardized Tools. GarnetMSP implements antivirus, monitoring, and security tools on all systems within a client environment, which ensures security and stability. Onsite admins have access and control of these powerful tools.
Areas of Specialization
24/7/365 Systems Management, Monitoring, and Security ~ Data Protection ~ Managed Backups ~ Cloud Storage ~ Business Continuity and Disaster Recovery ~ Risk Assessment ~ Remediation
Why Garnet River Cybersecurity
Large and small organizations alike face the risks of information security breaches. The potential losses are substantial, with the average quantifiable cost for a data breach in the U.S. being $4.88MM (IBM), not to mention the qualitative cost of reputational harm.
At Garnet River we recognize cybersecurity is not a point in time solution. We work with clients to develop processes that mitigate risk and enable the scalable, secure handling of information to operational, information, practical, and educational cybersecurity needs.
Garnet River also brings a unique multidisciplinary approach to data security and privacy. We understand the requirements, because we have foundational expertise in data security, infrastructure, and privacy. But we also understand the why and how…and that the right people paired with a technology-supported process makes assessment, analysis, action planning, and remediation efficient and effective.
Our practice lead is an (ISC)² security influencer and was lead information security architect for the U.S. Federal Reserve. We back him with information security engineers, technical architects, legal and compliance officers, and communications specialists.
The reason for this multidisciplinary approach: Information Security decisions are increasingly being made in the boardroom. That’s why your security staff needs greater exposure to the business, and the business needs to see the security staff as a partner that can align objectives with organizational imperatives.
Areas of Specialization
Assessments ~ CISOaaS ~ Compliance Review ~ Data Security & Privacy ~ Enterprise Architecture ~ Gap Analysis ~ Network & Security Monitoring ~ Policy Development ~ Remediation ~ Scanning ~ Vendor Evaluation
Service Offerings
IT Bundles
Workstation
Antivirus / Antimalware
Content / Web Filter
Ransomware Backup
Patch Management
Risk Analysis Reporting
Remote Monitoring & Response
Ticketing System for
Support Contact
USER
o365 Web Based Email
Office 365 (Word, Excel, etc.)
SharePoint Online
Microsoft Teams Productivity
AntiSpam / Malware /
URL Blocking
Email Encryption Capabilities
Email Backup and Archiving
SERVER
Antivirus / Antimalware
Content / Web Filter
Server Backup Solutions
Patch Management
Risk Analysis Reporting
Remote Monitoring & Response
Ticketing System for Support
Backup to Local and Cloud
NETWORK
Firewall Management
Switch
Appliance
Network Discovery
Remote Monitoring
Network Performance Monitoring
On-Premise
Mail Server Support
365 Mail Server
IT À La Carte
Backup services
Server @ 500gb
Workstation @ 50gb
Additional Backup
365 Mail Backup
MICROSOFT SERVICES
M-365 Pro Business Basic
O-365 Standard
O-365 Basic
MS-Teams Audio Conference
O-365 Kiosk (scanner user)
MANAGED DEVICES
Network: Firewall /
Managed Switch
Network: Managed Switch
Workstation
Virtual Server /
Physical Server
Storage / Backup Array
First ESXi Servers
Additional ESXi Servers
Mail Server: On Premise /
Cloud Based
Miscellaneous
Work As Assigned
Proofpoint Pro w/ Backup + Encryption
Proofpoint Pro
Monitor Only Agent
Managed AV
Mobile Device Management
Mailbox Migration
Ransomware Backup
Web Filter
Risk Intelligence
Cyberecurity
CISO as a Service
Security Architecture
Policies & Procedures
Security Scanning
Vulnerability Analysis
Tabletop Exercises
K-12 Data Security and Privacy
NIST Framework
Assessment Scoring
Gap Analysis
Threat Feed
Visual Reports
Remediation Support
NYDFS Security Program
Cybersecurity Assessment
Gap Analysis
NIST Compliance
Policies & Procedures
Security Architecture
Products
Yubico (MFA Devices)
YubiKey 5 Series
YubiKey FIPS Series
YubiKey Bio Series
Software Catalog
Albert Security Operations Center
Security…Powered by Platform
Much of our security program is delivered on a proprietary platform that offers standardized mapping across frameworks, centralized risk and compliance data, and automated cyber and IT risk management. It’s technology done right: easy, transformative, and insightful.
PARTNERS: