KLC Consulting focuses on information Security and IT Audit so you can focus on your business.
KLC Consulting wants to earn your trust and be your Compass in the Midst of Chaos. KLC's mission is to provide a continuous effort to protect the confidentiality, integrity and availability of your corporate resources and data. Achieving security for your corporate information assets and compliance to new regulations demand constant vigilance and knowledge of what to look for. Through each stage of the information security lifecycle, we help you prevent, detect, respond to, and resolve your enterprise security issues.
KLC encompasses expertise in the Security Assessments, IT Audit, Web, Application, Database, and Network Security, Financial Regulations (GLBA, Sarbanes-Oxley (SOX)), Healthcare (HIPAA), PCI and Pharmaceutical (21 CFR Part 11), MAC Address (Network Address) based Security, Vulnerability Management and Protection, Security Technologies Design and Implementation, and a full range of Professional Security Services.
KLC Consulting, Inc. has oer 18 years of experience ranging from Fortune 500 companies and government agencies to small/medium businesses in a variety of Information Security and Technologies. Our consultants include Certified Information Systems Security Professionals (CISSP), Certified Information Systems Auditors (CISA), Certified Information Privacy Professional/Government (CIPP/G)and certified professionals of Checkpoint®, Cisco®, Microsoft®, Computer Associates®, Juniper Networks®, Novell®, Lotus®.
Keywords: Penetration testing, Information Security, Ethical Hacking, antivirus, anti-virus, anti-spam, antispam, computer forensics, incident response, security research, IT Audit, Security Assessment, Architecture Review, Web Application Security, PCI, GLBA, SOX, Gramm-Leach-Bliley, Vendor Security, DLP, Data Leak Protection, MAC Address, MAC, Spoof, hack, Windows 2000, Windows XP, Windows 2003, Windows VISTA, Change MAC Address, Network Address, NIC, Network Interface Card, Media Access Control, HIPAA, 201 CMR 17, 21 CFR Part 11, Privacy, ISO 27001, ISO 27002, Disaster Recovery, Business Continuity, security assessment, vendor risk assessment, vendor risk management, third-party security, DIACAP, NIST, FISMA, C&A, ST&E, Application Security, CISCO, JUNIPER NETWORKS, CHECKPOINT, SYMANTEC, MCAFEE, TREND MICRO, SOPHOS, Utimaco