Pervasive Solutions was founded in 2005 by three partners who had extensive experience in the field of Information Security – which had been applied in diverse roles and diverse industries resulting in a combination of skills and experiences that very aptly complemented each other.
Over the last ten years we have developed a solid business practice by continuously increasing our skills, experiences and awareness of all that is entailed in the on-going process of improving an organization’s security posture. Our team continuously invests significant time and money to learn and grow at a pace that keeps up with the latest activities, incidents, threats, schemes, malware programs, and regulations.
To empower our clients to achieve their own success by securing their operations from information and technology threats that seek to misuse and misappropriate their data, systems and communications.
Our Strategic Approach
Many organizations view information security as an IT issue solved by putting in hardware and software solutions. An analysis of some of the most common (and most damaging) breaches will show that focusing on Technology alone has not been enough to prevent unauthorized intrusions leading to significant financial and reputational loss. For a strategy to be effective, it must include two other critical Perspectives: the organization’s People and Processes.
Value Proposition from Pervasive
We will revisit your security measures in order to make sure you are protected from anti-malware, anti-spam, and that you have your IT administrative permissions correctly configured for maximum benefit. We will review your policies and procedures at a high level and make recommendations on how these might be improved to protect your privacy, your client’s privacy, and your good name.
Proactive vs. Reactive
Based on what we have seen and heard from you so far, your current relationship is very much reactive. We witnessed a warning light on your primary server that had been on for who knows how long – your IT partner should have gotten an alert right away and addressed any issues before it was too late. We try very hard to monitor the environment and all of your critical resources and events, and make sure we are alerted the minute something deviates from normal activity. The old adage “an ounce of prevention is worth a pound of cure” is very fitting here. To the extent we are more proactive, your people will feel significantly less impact. To not do anything until after the fact costs you more in down time and lost productivity, and frankly it costs us more to support a critical incident where we have to react to an urgent situation (that perhaps could have been avoided).
We also find it helpful to send you status reports on a monthly basis so you are able to forecast what resources might be needed in the near future, rather than be blindsided at the last minute by an unplanned purchase.
Strategic vs Tactical
We want to understand your business and look for opportunities where technologies can reduce cost, add value and streamline business functions. We enjoy assessing new technologies on your behalf, and considering how they might be used to streamline your processes. We can work with you to help define, evaluate and implement technologies that would positively impact your business – without risking your production environment.
The tools we use help us “see” what is going on, and isolate events to specific devices and times. This greatly expedites our zeroing in in the real problem and addressing it with the best solution…the first time.
Update and Automate your Backup Process
We believe we can recommend a much better backup solution and process that will significantly improve your ability to recover in the event you need to. We would start by transitioning Mendon Capital to current state technology (disk based backup, both on and off site). We will design, implement and monitor your backup solutions. And while backing up is important, testing for the ability to restore is the most important – and we do this.
We would like to review what you have in place and make recommendations on how you might improve performance and security in this area.
Virtualize the environment
Once we get a good understanding of your server environment, we can help you streamline this and make better use of your resources.
Leverage knowledge and share best practices
Leverage knowledge and share best practices relevant to the Office Tools you are using and your Bloomberg App, as we have knowledge and experience working with them. We have some customers using these apps already which has helped us to gain familiarity with the application, and allows us to see ahead of time how it will respond to updates and changes in the software.
We work hard on continuously improving our ticket notification process, and our responsiveness, and having multiple points of visibility so messages that are left do not fall through the cracks and go un responded to.
Hire & Retain
10. We hire and retain very good information technology engineers. With very little turnover, the investments we make in knowing our customers payoff for long periods of time.