Internet Security

Topics: Computer network, Security, Computer security Pages: 46 (14071 words) Published: July 20, 2010
| IT Security Consultants, Inc.
555 East 1000 South, Salt Lake City, UtahPhone Number: (801) 555-0100 Fax: (801) 555-0110 | 2/23/2009| |
FTD Enterprises|
Request for Proposal|
Brandon Moore
Justin JoosBrandon LittleMark PetersonJason Kilgore|

**This document meets a request for proposal from FTD Enterprises to implement a security infrastructure and other tasks stated in the proposal.|

Table of Contents

Company Overview3
Project Team Staffing4
Executive Summary7
Scope, Approach, and Methodology8
Risk Assessment8
Problems and Solutions8
Project Management14
Task List15
Network Topology24
Appendix: Detailed Budget33
Appendix: Risk Assessment35
Appendix: Continuity Plan37
Appendix: Backup/Disaster Recovery Plan45
Appendix: Business References51
Appendix: References52

1. Company Overview
IT Security Consultants, Inc. was founded in 2001. We are a consulting and networking solutions provider. Our staff consists of experienced architects, project managers, analysts, and application developers to help organizations make the most effective use of their systems, people and processes.

IT Security Consultants, Inc. is lead by a highly qualified group of business and technology professionals whose collective backgrounds consist of years of experience. This in-depth experience is well-rounded in business procedures and networking techniques.

We have managed projects throughout the IT spectrum: from strategic network planning, device selection to installation, application development, conversion, training, and support. Our success is predicated on high calibre, experienced professionals who build positive, lasting relationships with our clients. We work closely with our clients to understand their goals so that our projects can meet their needs and expectations.

Careful planning is the key to preventing expensive surprises and disappointments. We ensure that the recommendations we put forward are 'implementable' within a reasonable time-frame and reasonable cost-range, based on your operational needs.

Our Mission: To exceed client-expectations at every stage of the process by providing exceptional service and assuring, through innovation and industry best practices, the most effective solutions.

2. Project Team Staffing

Brandon Moore
IT Security Consultants, Inc.

Brandon Moore is the CEO and co-founder of IT Security Consultants, Inc., a unique computer network consulting firm. Since 2004, IT Security Consultants, Inc. has been recognized as a leading consulting company. Brandon currently maintains a Bachelor’s of Computer Science and a Master’s of Business Administration. Brandon Moore began his career in information security five years ago with a large web development company. Later, Brandon was a consultant for emerging technical companies, before beginning his own. He began IT Security Consultants, Inc. in 2001 with the desire to bring answers for security and reliability concerns to other businesses currently without the resources or knowledge to do so. The projects IT Security Consultants, Inc. takes on are typically very large and often costly. As CEO of IT Security Consultants, Inc., Brandon takes a genuine interest in all his customers, and involves himself in the design and planning of most projects. He has built IT Security Consultants, Inc. to not only be an information security power house, but to also provide excellent maintenance and customer service to customers.

Justin Joos--President

As President and co-founder of IT Security Consultants, Inc., Justin manages all major aspects of the company, including: Sales, Marketing, Customer Service, Accounting, Human Resources, and Recruiting. Previously, he held top management positions at Vitronix, a $75 million systems integrator and training organization. Vitronix had the first and largest...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Information Systems Security Survey Essay
  • Essay about It Security and Control
  • Internet Security Essay
  • Internal & External Security Paper for the Hospitality
  • Computer Security Essay
  • Security Posture Assessment Scope of Work Essay
  • Information Security Strategy Essay
  • Nt2580 Final Project Essay

Become a StudyMode Member

Sign Up - It's Free