ABOUT US

The SECentric team has over thirty years in information security program development and consulting. We understand the diverse challenges faced by organizations of all types and sizes. We have leveraged this experience to create customizable solutions, which can be specifically designed to meet your unique security program needs.


With nearly four decades of information security program development and consulting experience, we understand the diverse security challenges faced by organizations of all types and sizes. We have leveraged this expertise to develop comprehensive policy content that can be quickly accessed and customized through an intuitive and educational web portal.


Most organizations can be negatively impacted by the actions of malware, hackers, and malicious insiders. A well developed and implemented Cyber Security Policy is foundational to protecting your organization’s information systems, intellectual capital, customer and partner relationships, company brand, and ultimately shareholder value. Understanding how important this is, SECentric has built a solution which helps you construct a Cyber Security Program to manage the risks threatening your organization.


SECentric replaces time-consuming and inefficient manual policy development practices with a fast, flexible and automated policy lifecycle management solution, providing an effective way to help you establish, manage and continually improve your information security program.


SECentric provides customizable policies required by major regulatory/compliance frameworks, while saving you from the expense of a high-priced consultant. These frameworks include:


  • SOX
  • HIPAA
  • PCI
  • CSA
  • NIST
  • COBIT
  • ISO 27000
  • TrustServices

The SECentric Enterprise Policy Suite contains the following policy control categories:


  • Acceptable Use
  • Account Management
  • Application Security
  • Backup
  • Bring Your Own Application
  • Bring Your Own Device
  • Change Management
  • Clean Desk
  • Cloud Services (NIST SA- 9 & 4)
  • Cryptography
  • Data Classification
  • Guest Access
  • Incident Management
  • Logging
  • Media Protection
  • Network Security
  • Personnel Security
  • Priveleged Access
  • Regulated Data Processing
  • Remote Access
  • Remote Worker
  • Risk Management
  • Safety and Security
  • Secure Passwords
  • Security Monitoring
  • Security Training
  • System Security
  • User Privacy
  • Vulnerability Assessment and Management