What ThreeShield Can Do For You

Why “IT Security On-Demand”?

There are six situations that really require IT Security management support:

  1. Vulnerability, risk, and disaster preparedness assessments
  2. During and after a breach
  3. As little as one hour per week to coordinate security remediation
  4. Consulting on new projects
  5. Continually monitoring for new vulnerabilities and security trends
  6. Software and other system development design and development
Companies often require significant security support when they begin their security, disaster preparedness, and vulnerability management programs. However, after a couple months, your security management needs gradually decrease to a handful of hours per week.

Read more
Our proprietary tools, evidence gathering systems, and process significantly reduce the time and cost of our vulnerability assessments while providing great flexibility in the scope of your review. Our proprietary tools, evidence gathering systems, and process significantly reduce the time and cost of our engagements. These tools and processes also allow us to limit travel costs for engagements outside of Calgary, Alberta. As such, we are often able to provide faster and more comprehensive service throughout Canada and the United States than other local offices.
Learn More

Nobody likes annual training videos

We reinforce our short game-like training sessions with practical simulations and tools to help you track real-life progress instead of just quiz completion.

Phishing simulations, "malicious" USB drives, and suspicious reporting plug-ins for Office, Gmail, Lotus, and other email systems change behaviour to secure your business.

Of course, compliance drives a lot of training programs. We have you covered and give you the flexibility of short 5 or 15 minute sessions to keep Information Security Awareness current throughout the year or big-bang sessions to meet last-minute deadlines.
Read more

Instant Security & PCI Compliance

Are your credit card machine and customer databases properly isolated and protected by a firewall with:

  • multi-factor authentication,
  • automatic updates,
  • current network encryption standards, and
  • automatic monitoring?
  • Can you detect and prevent:

  • unusual data transfers that might signal data theft,
  • worms and ransomware that aren't hitting your antivirus,
  • unauthorized computers on sensitive networks, and
  • other threats?
  • If you're relying on consumer-grade routers -- or even most general-purpose enterprise firewalls, you probably aren't meeting PCI credit card compliance requirements or adequately protecting your information. Lavawall™ does all of this in a tiny little box.

    For total PCI compliance, we offer PCI training, scanning, policies, procedures, and consulting with the Lavawall™


    Get your Lavawall today!.
    Lavawall
    `

    Ready to protect your business?

    PUT OUR SKILLS AND EXPERIENCE TO WORK FOR YOU TODAY

    Customers

     “
    As the Chief Compliance Officer of a payments entity, I have relied on ThreeShield Information Security to provide risk-based solutions that have satisfied regulators and business partners alike. While our Money Services Business is unique in that it supports commerce within virtual worlds and video game environments, the security standards that we have to meet are the same as they would be for any regulated financial institution.

    ThreeShield has employed a dynamic, risk-based approach to information security that is specific to our business needs but also provides comfort to our external stakeholders.

    I recommend their services.

    -Scott Butler, CCO of Tilia Inc.

    ” 

    ThreeShield Information Security has provided customized IT security tools and consulting to organizations of all sizes, including the following:
    1-Page  •   Calgary Foothills Primary Care Network  •   Carrier Corporation  •   Collins Barrow Calgary LLP  •   Computer Sciences Corporation  •   Deloitte  •   Ernst & Young  •   Escape Ops  •   First Gulf Bank  •   Government of Alberta  •   Hamilton Sundstrand Corporation  •   Hurricane Computer Solutions  •   International Aero Engines  •   KPMG  •   Linden Research (Linden Lab)  •   NASA  •   NORESCO  •   Otis Elevator Company  •   Plateau Systems  •   Pratt & Whitney  •   Red Link SA (Argentina)  •   Segurança da Informação e Conformidade  •   Sikorsky Aircraft Corporation  •   Tilia Inc  •   TOOT'n TOTUM  •   Towers Watson  •   United Technologies Corporation  •   Universidade de São Paulo  •   UTC Power  •   Whitecap Resources Inc