We have been delivering IT Infrastructure and Cybersecurity services for over two decades. This is bedrock for our clients. The infrastructure must be high performing and robust, to optimize the client’s performance across all functions. The client must also comply with all applicable data privacy laws and regulations, while ensuring data and systems are as secure as possible. Our multi-disciplinary team includes compliance experts, lawyers, network engineers, and systems engineers…bringing various vantage points and skill sets to bear to see everything and get the job done right.

Infrastructure and Cybersecurity

We offer full or partial managed infrastructure and CISO services, as well as legal & risk management, so your team can focus on pro-growth, big-picture department and organizational goals.

Garnet River Infrastructure & Security Practice Lead Mike Donnelly

“For business owners and manager, IT is often viewed as break/fix. That is, systems are valued at the start of an enterprise…and then again when there are disruptions that need to be corrected. Otherwise, it’s an afterthought.

This is problematic on numerous levels. The obvious problem being that waiting for a problem to happen is disruptive to operations and often costly when it does. Not to mention the diminished performance of your network over time if you don’t maintain it.

However, the bigger issue is the safety and security of the information contained on your systems. And that’s where Garnet River can help. We can support your staff and fill in gaps with IT infrastructure and security, or we can lead.”

Mike Donnelly, Practice Lead

  • Celebrating visionaries & integrators on National IT Professionals Day

    National IT Professionals Day, celebrated on the third Tuesday of September, is dedicated to recognizing the contributions of information technologist globally.

  • Post IT Attack Remediation for a Local Government

    In need of post IT attack remediation, a local government turned to Garnet River to restructure networks and servers and prevent future attacks.

  • Vulnerability Testing for an International Chemical Manufacturer

    Garnet River’s vulnerability testing helped support international commerce, compliance with international regulatory frameworks, exploit remediation. 

  • Escaping the Siloes and Shadows of State Agency IT Operations

    When NYS put EdLaw 2D Part 121 into effect, most school districts scrambled to understand the law and determine gaps. Garnet River developed a program to help.

Garnet River Chief Information Security Officer Michael Weisberg

“Information security is a journey, not a destination. Compliance is not an end state but a checklist that provides direction for the journey. At Garnet River, we help clients navigate this journey. We emphasize the basics, but we complement them with a strong information security program, technical tools, and sound policy…all while mapping progress and remediating issues along the way.”

– Michael D. Weisberg, Chief Information Security Officer 

Why Garnet River Infrastructure

We’ve got our head in the clouds…and that’s a good thing. As experts in information technology, infrastructure, security, and modular systems thinking, we provide you with access to a smart, cost-effective alternative to maintaining your networks.

With limited resources, small- to mid-size organizations often have difficulty prioritizing infrastructure and security projects, we offer full or partial managed information technology with bundled or a la carte services. Key benefits include:

  • Staff Augmentation. In-house information technology teams can find themselves under enormous stress during busy seasons and periods of growth. Co-management offers a helping hand to maintain delivery, prevent burnout, and preserve morale.
  • On-demand Expertise. When your team runs into issues they are not equipped to respond to, a co-managed service provider (MSP) serves as a crucial backup and resource.
  • Improved Security & Compliance. Businesses cannot afford to let security and compliance take a backseat. A co-managed service provider offers proactive protection and expertise.
  • Enhanced Productivity. Information technology downtime is one of the biggest drivers of lost workplace productivity. Proactively caring for your network and dividing the required responsibility and tasks can boost productivity and ensure employees focus on work that drives business performance.
  • Standardized Tools. GarnetMSP implements antivirus, monitoring, and security tools on all systems within a client environment, which ensures security and stability. Onsite admins have access and control of these powerful tools.

Areas of Specialization

24/7/365 Systems Management, Monitoring, and Security ~ Data Protection ~ Managed Backups ~ Cloud Storage ~ Business Continuity and Disaster Recovery ~ Risk Assessment ~ Remediation

Why Garnet River Cybersecurity

Large and small organizations alike face the risks of information security breaches. The potential losses are substantial, with the average quantifiable cost for a data breach in the U.S. being $4.88MM (IBM), not to mention the qualitative cost of reputational harm.

At Garnet River we recognize cybersecurity is not a point in time solution. We work with clients to develop processes that mitigate risk and enable the scalable, secure handling of information to operational, information, practical, and educational cybersecurity needs.

Garnet River also brings a unique multidisciplinary approach to data security and privacy. We understand the requirements, because we have foundational expertise in data security, infrastructure, and privacy. But we also understand the why and how…and that the right people paired with a technology-supported process makes assessment, analysis, action planning, and remediation efficient and effective.

Our practice lead is an (ISC)² security influencer and was lead information security architect for the U.S. Federal Reserve. We back him with information security engineers, technical architects, legal and compliance officers, and communications specialists.

The reason for this multidisciplinary approach: Information Security decisions are increasingly being made in the boardroom. That’s why your security staff needs greater exposure to the business, and the business needs to see the security staff as a partner that can align objectives with organizational imperatives.

Areas of Specialization

Assessments ~ CISOaaS ~ Compliance Review ~ Data Security & Privacy ~ Enterprise Architecture ~ Gap Analysis ~ Network & Security Monitoring ~ Policy Development ~ Remediation ~ Scanning ~ Vendor Evaluation

Service Offerings

IT Bundles

Workstation

Antivirus / Antimalware

Content / Web Filter

Ransomware Backup

Patch Management

Risk Analysis Reporting

Remote Monitoring & Response

Ticketing System for
Support Contact

USER

o365 Web Based Email

Office 365 (Word, Excel, etc.)

SharePoint Online

Microsoft Teams Productivity

AntiSpam / Malware /
URL Blocking

Email Encryption Capabilities

Email Backup and Archiving

SERVER

Antivirus / Antimalware

Content / Web Filter

Server Backup Solutions

Patch Management

Risk Analysis Reporting

Remote Monitoring & Response

Ticketing System for Support

Backup to Local and Cloud

NETWORK

Firewall Management

Switch

Appliance

Network Discovery

Remote Monitoring

Network Performance Monitoring

On-Premise
Mail Server Support

365 Mail Server

IT À La Carte

Backup services

Server @ 500gb

Workstation @ 50gb

Additional Backup

365 Mail Backup

MICROSOFT SERVICES

M-365 Pro Business Basic

O-365 Standard

O-365 Basic

MS-Teams Audio Conference

O-365 Kiosk (scanner user)

MANAGED DEVICES

Network: Firewall /
Managed Switch

Network: Managed Switch

Workstation

Virtual Server /
Physical Server

Storage / Backup Array

First ESXi Servers

Additional ESXi Servers

Mail Server: On Premise /
Cloud Based

Miscellaneous

Work As Assigned

Proofpoint Pro w/ Backup + Encryption

Proofpoint Pro

Monitor Only Agent

Managed AV

Mobile Device Management

Mailbox Migration

Ransomware Backup

Web Filter

Risk Intelligence

Cyberecurity

CISO as a Service

Security Architecture

Policies & Procedures

Security Scanning

Vulnerability Analysis

Tabletop Exercises

K-12 Data Security and Privacy

NIST Framework

Assessment Scoring

Gap Analysis

Threat Feed

Visual Reports

Remediation Support

NYDFS Security Program

Cybersecurity Assessment

Gap Analysis

NIST Compliance

Policies & Procedures

Security Architecture

Products

Yubico (MFA Devices)
YubiKey 5 Series
YubiKey FIPS Series
YubiKey Bio Series

Software Catalog

Albert Security Operations Center

Security…Powered by Platform
Much of our security program is delivered on a proprietary platform that offers standardized mapping across frameworks, centralized risk and compliance data, and automated cyber and IT risk management. It’s technology done right: easy, transformative, and insightful.

Cyber Assessment Summary - Framework Score Example
Cyber Scoring Map of Target Score Against Current Score
Cyber Standardization Strength Score Chart

PARTNERS:

Microsoft Logo
Cisco Meraki Logo
Hewlett Packard Enterprise
Fortinet
Cynet
Robocorp