What ThreeShield Can Do For You

Why “IT Security On-Demand”?

There are six situations that really require IT Security management support:

  1. Vulnerability, risk, and desaster preparedness assessments
  2. During and after a breach
  3. As little as one hour per week to coordinate security remediation
  4. Consulting on new projects
  5. Continually monitoring for new vulnerabilities and security trends
  6. Software and other system development design and development
Companies often require significant security support when they begin their security, disaster preparedness, and vulnerability management programs. However, after a couple months, your security management needs gradually decrease to a handful of hours per week.

Read more
Our proprietary tools, evidence gathering systems, and process significantly reduce the time and cost of our vulnerability assessments while providing great flexibility in the scope of your review. Our proprietary tools, evidence gathering systems, and process significantly reduce the time and cost of our engagements. These tools and processes also allow us to limit travel costs for engagements outside of Calgary, Alberta. As such, we are often able to provide faster and more comprehensive service throughout Canada and the United States than other local offices.
Learn More

Nobody likes annual training videos

We reinforce our short game-like training sessions with practical simulations and tools to help you track real-life progress instead of just quiz completion.

Phishing simulations, "malicious" USB drives, and suspicious reporting plug-ins for Office, Gmail, Lotus, and other email systems change behaviour to secure your business.

Of course, compliance drives a lot of training programs. We have you covered and give you the flexibility of short 5 or 15 minute sessions to keep Information Security Awareness current throughout the year or big-bang sessions to meet last-minute deadlines.
Read more

Increase visibility and save time

Our tools automate security assessments so you can focus on what matters: your business.

Security Configuration Analyzer for Unix    Security Configuration Analyzer for Windows
Automate security configuration collection, monitoring, and assessment for Unix, Solaris, SunOS, AIX, HPUX, RedHat, CentOS, and other Unix-like platforms. Automate security configuration collection, monitoring, and assessment for Active Directory, group policies, and more for Microsoft Windows server and desktop platforms.

Increase your efficiency today!.
`

Ready to protect your business?

PUT OUR SKILLS AND EXPERIENCE TO WORK FOR YOU TODAY

Customers

ThreeShield Information Security has provided customized IT security tools and consulting to organizations of all sizes, including the following:
1-Page  •   Carrier Corporation  •   Computer Sciences Corporation  •   Deloitte  •   Ernst & Young  •   First Gulf Bank  •   Government of Alberta  •   Hamilton Sundstrand Corporation  •   Hurricane Computer Solutions  •   International Aero Engines  •   KPMG  •   Linden Research (Linden Lab)  •   NASA  •   Note-able Music  •   NORESCO  •   Otis Elevator Company  •   Plateau Systems  •   Pratt & Whitney  •   Red Link SA (Argentina)  •   Segurança da Informação e Conformidade  •   Sikorsky Aircraft Corporation  •   Tilia Inc  •   TOOT'n TOTUM  •   Towers Watson  •   United Technologies Corporation  •   Universidade de São Paulo  •   UTC Power  •   Whitecap Resources Inc