pangolin.consulting

information technology and security services

Operations Services

Information Technology

IT services include a number of resource planning and management functions.

  • ITIL Process Design and Implementation
    Design and implement IT processes that ensure effective and efficient delivery of IT services to the business including advising on incident management, problem management, and change management.
  • Service Level Agreement (SLA) Management
    Define and manage service level agreements (SLAs) with vendors and/or service providers to ensure they are meeting the agreed-upon levels of service and quality
  • Change and Release Management
    Review and manage changes to IT systems and applications to ensure they are made in a controlled and coordinated manner, minimizing the risk of disruption to the business
  • IT Strategy & Roadmap Development
    Align your IT resources with your business objectives by formulating a roadmap.
  • System Design & Architecture
    Make sure that your product or solution gets deployed smoothly with careful planning. Create as-built documentation to help articulate your company’s unique infrastructure or processes
  • IT & Business Risk Management
    Ensure that your company’s technology resources are safe from unplanned events
  • IT Cost Optimization
    Identify opportunities to optimize technology spending, such as reducing licensing, consolidating services, implementing cloud services, or utilizing native capabilities to reduce overhead while maintaining or improving service levels
close up photo of person typing on laptop

Information Security

IT services consist of a range of reviews and assessments of systems or organizational program development practices.

  • Reviews & Assessments
    Security and risk assessments help prevent financial losses and reputation damage by identifying vulnerabilities, protecting against potential threats, and supporting compliance with industry regulations.
    • Cybersecurity Risk Assessment
      Perform a review of your existing cybersecurity program and control measures, identifying potential risks and vulnerabilities, and recommending strategies to mitigate those risks using an established framework (NIST-800-53)
    • Privacy Risk Assessment
      Perform a review of your company’s privacy program and cybersecurity measures as they relate to industry regulations such as HIPAA
    • Security Architecture Review
      Examine your existing cybersecurity architecture and recommending improvements to enhance the security of your systems and data.
    • Cloud Security Review
      Assess the security of your cloud infrastructure and recommend strategies to ensure data protection and compliance.
  • Portfolio & Program Management
    Make enterprise-level IT/IS management programs accessible to small businesses enabling leadership to better prioritize projects and allocate resources.
    • Incident Response Planning
      Develop an incident response plan to help the respond to and recover from a cybersecurity incident. This is modeled after an industry recognized framework, Computer Security Incident Handling Guide (NIST-800-61)
    • Governance
      Develop a comprehensive IT/ITSM, information security, or data governance framework for your organization.
      Build upon well-established best practices to create a program for your organization: COBIT, ITILv3, NIST-800-53, NIST-800-171, or CIS20
person using macbook pro on pink table