VizionTech is a company dedicated to providing Computer Security Certification and high level E-Security and Network consulting services. Our senior level Certified Information System Professionals (CISSP) have served many businesses in the Los Angeles area.

Dealing with the requirements imposed by regulatory and industry standards are a top concern for executives and IT personnel. The struggle to reach compliance - and then maintain it - calls for automation, policies and third-party expertise that most organizations have yet to implement.

    COST EFFECTIVE: It is cost efficient to use Certified senior level Information System Engineers on a contract/as needed basis. The services are easy to implement and cost savings begin to appear quickly as Network Infrastructure and Security is enhanced.

    PRODUCTIVITY: Productivity of everyone in the organization increases as staff benefit from the safety and availability of business applications.

    EXPERTISE: You can get proven senior level Certified experts to deal with your Networking/Infrastructure and Security needs at your convenience

    PROTECTION: You can receive the highest level of security protection for your networks. You can protect your digital assets from potential risk.

Why should you care?

Itís good business practice: Make sure that nobody is using your computer to do things that may harm your business and jeopardize your business relationships and reputation. Make sure to let your customers and business partners know that information is kept confidential and secure at your company. Furthermore, donít take the risk of becoming legally liable for someone elseís actions.


It is a Law
    California Senate Bill 1386 became effective on July 1, 2003. This legislation requires companies and government agencies to inform an individual when there has been an unauthorized acquisition of that individual's name (or "a reasonable belief that such a security breach occurred") along with a Social Security Number, driver's license number, or a customer account number.
    The U.S. Patriot Act was enacted in 2001 in response to the 9/11 terrorist acts. The intent is for banks, credit unions and other financial institutions to verify the identity of all people who do business with them. It has become clear that terrorist groups have used the banking industry to funnel money to commit crimes.
    Health Insurance Portability and Accountability Act of 1996 (HIPAA) - By April 21, 2005, all health care providers in the U.S. will be required to comply with federal regulations governing the use and storage of patient medical information. To deliver effective health care and to control health care costs, patient data is routinely shared electronically among health care providers and payers. This electronic sharing poses security risks including operational breakdown, loss of business, bad publicity, accreditation roadblocks and exposure to litigation.
    Sarbanes-Oxley Act of 2002 - Section 404 of the Sarbanes-Oxley Act requires the CEO and CFO of publicly traded companies to certify the effectiveness of internal controls as they relate to ensuring the accuracy of financial information. Dependence on electronic information and IT systems is essential to support critical business processes.
    GLBA - The Gramm-Leach-Bliley Act (GLBA) requires U.S. financial institutions to ensure the security and confidentiality of customer records and information. The U.S. Department of Treasury distributed guidelines to address standards for developing and implementing safeguards to protect the security, confidentiality and integrity of customer information. The deadline for compliance was July 1, 2001.

eSecurity Services

    IT Network and Computer Security Certification
    Policy Development
    Security Strategy and planning
    Product installation/deployment
    Monthly Vulnerability analysis/penetration testing
    Firewalls
    Antivirus systems
    Business continuity planning
    Switches, VLANs
    Routers, ACL
    IDS systems and monitoring
    Backup and Recovery Solutions
    Clustering
    Remote monitoring
    Security Help-Desk
    Managed security services
    Vulnerability and threat information
    Incident response and cyber forensics
    Identity management


Send mail to web/at/viziontech.com with questions or comments about this web site.
© 2006 Vizion Technologies. All Rights Reserved.
Last Modified 2/05/06