Sign In
Bookmark and Share
Security Assurance
Ensure the confidentiality, integrity, availability, and compliance of your information technology.

Security Assurance

Ensure the confidentiality, integrity, availability, and compliance of your information technology

If you are like most successful business leaders, you are extracting more and more value from technology. You are depending on it to design processes, access knowledge, and provide the connectivity your employees, your business partners, and your customers need to work productively. The question is how secure are the systems and networks that you are depending on?

If you are concerned about these issues, but don’t know where to turn, our security assurance consultants can help. They can help you ensure the integrity and availability of your information. 

You can depend on our expertise and experience

We have a team devoted to information security issues. They carry professional certifications including Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and Certified Public Accountant (CPA).

You also can depend on our security assurance consultants to understand your business. We serve thousands of organizations in a range of industries that includes services, manufacturing, health care, financial institutions, education, and government. We will come to your project aware of compliance issues, legislation, regulations, and trends that affect it. 

You will benefit from our proven security methodology

Because information systems are developed to fit the specific needs of organizations, there is no generic set of standards for security. We often get asked — “Are we protected?”

You will benefit from our experience answering this question for many other clients. We have developed proven methodologies. We will assess your existing controls and help you locate areas of risk. We will offer suggestions to correct weaknesses.

You will also have the peace of mind that we have tested your security policies and the ways they are implemented against standards, best practices, and benchmarks.

When your goal is to provide a secure, well-controlled IT environment, Plante Moran can assist with: 

  • Information security risk assessments
  • Information technology audits (including general technology controls
  • SAS 70 reviews  
  • Network security assessments/penetration testing 
  • Business continuity planning
  • Application controls (including ERP systems and web application security) 
  • Privacy audits (GLBA & HIPAA) 
  • Standards and compliance