Frequently Asked Questions

About CompSec Global Solutions

Does CompSec Global Solutions have field technicians?

At the moment we offer “in the field” service in the Northern Front Range of Colorado.

At some time in the future, we expect to expand this service – however, at this time, we offer solutions and consulting services for companies and their technicians to use throughout the USA, Canada and beyond. Our tools and solutions are currently being used Globally – both in-house written and those our of partner vendors.

Where is CompSecurity Global Solutions based?

Our main office is based in Northern Colorado in the USA. However, you might talk to some of our staff that are located in a different state.

Our staff is rich in culture and back grounds but we are all AMERICANS! You will never talk to anyone from our office in a foreign country – even if they have a accent.

FACT: Did you know that the President of our company was born and raised in England? You might talk to him on the phone as he enjoys helping our clients when he has time.

Computer Security Solutions is a division of Web Your Business Inc. – we can be contacted here.

General Questions

Can you sell me any of the products or services?

That is not as straightfoward a question as it would seem.

Firstly, it depends on the product/service you are referring to, then what your location is, and lastly, on the agreement we have with the company that produced the solution.

e.g. – For the anti-threat solutions produced by Eset llc (NOD32 Antivirus), we are a reseller with the rights to sell into the USA and Canada ONLY. Although we are in negotiations to obtain rights to sell into the UK as well, until finalized, we can not sell to you if you are outside of the USA or Canada.

Our product specific sites answer these questions and more in their dedicated product FAQ sections.

What does “best of breed” mean?

In short – we offer and recommend only those products and services which we recognize, and independent testing facilities have acknowledged as the best in their class.

This means that a product must have superior protection, value for money, or both.  It is possible for a product to be best of breed without being the product we recommend most often.  For example, a solution which protects virtualized environments might not be our most recommended solution for hardware based environments.

How can there be more than one “best of breed” solution in a category of products or service?

Because there are often several factors associated with making a decision to purchase a product, each of these factors could make one product or product range stand higher than their competitors.

An example would be the factor of price. In an ideal world, price would not be a factor, and everyone would be able to afford the very best of protection. However, in the real world, cost is often a big factor in the corporate and individual purchasing decision.

We recognize that not every purchaser has the same purchasing budget, so it is within reason to have a best of price range qualifier applied to the products we carry. Sometimes the best priced product isn’t worth purchasing, and in those circumstances, it would not make our product list – in other classes of products, there will be a low-cost alternative to what we would consider the “ultimate” protection system.

Products carried by CompSec Global Solutions

Why don’t you carry product ‘X’?

There could be several reasons why a particular product isn’t part of our product range

  • a product might not be “best of breed”
  • we might not know about a product
  • it’s possible that a product was surplanted – or overtaken

If you think we should be carrying a particular product, please contact us about said product/product range.

I think you should carry product ‘X’ – would you?

We might – if we consider it “best of breed” – if you think we should be carrying a product – please let us know!

Please contact us to tell us about your product.

Carbonite E2 Appliance – what is it?

The carbonite E2 appliance is a physical server which sits on your premises, it is the local backup of your machines and you pay for your backup based on the size of the backed up data.

Using a Carbonite appliance will provide you with either 0.5TB or 1TB of local storage, with offsite storage and one year of retention included in the price.

The appliance uses AES-256 encryption server-side – meaning your data never leaves your organization in an un-encrypted form – your backups are HIPAA compliant with a Carbonite appliance!

What are the differences between Carbonite home + business products?

Carbonite home products are simple cloud backup solutions – designed to backup your data – the backup will allow you to download your data to a new machine, or back to the same machine in the event of a failure or malware infections – or – as is most likely, in the event of an accidental deletion.

Carbonite business products off the same backup and are controllable by your IT manager, your IT consultant and offer similar backup strategies, plus a whole lot more – you can backup your Exchange server, you SQL-Server databases, your Sharepoint server. You can run a mixture of local + cloud backup for faster recovery. The new Carbonite appliance with prices starting at $99/month will offer you any number of desktops backed up locally and you can even plan on bare-metal restore of computers – ie, you can backup the entire operating system!

Security Consulting

What types of consulting do you offer?

We provide everything from needs analysis, policy review (both IT policies and HR policy documents), through white-hat security scanning of your IT infrastructure using the latest vulnerability scanning as well as brute force attacks. We can provide a review of our current procedures or test your staff on intruder prevention.

Do you only provide consulting combined with software/hardware purchase?

Absolutely not! Many customers have solutions which just need to be evaluated and tweaked. Other customers have nothing in place and must rapidly get up to speed with solutions and procedures, whether these requirements be a compliance issue, or for insurance purposes. We are not trying to sell you a solution – if one is appropriate, we will help decide the best solution – if this solution is not from our list of solutions, we will provide you a list of vendors who have the correct solution.

What is a Security Policy?

Security policy is a definition of what it means to be secure for a system, organization or other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by mechanisms such as doors, locks, keys and walls. For systems, the security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people.

Security Management

What is Security Management?

Broadly speaking, Security Management is a the field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization’s information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.

What is Access Control?

An access control system is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.

What is Alarm Management?

Alarm management is the application of human factors (or ergonomics as the field is referred to outside the U.S.) along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability.

What is Physical Security?

Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media and guidance on how to design structures to resist various hostile acts. It can be as simple as a locked door or as elaborate as multiple layers of armed Security guards and Guardhouse placement.

Carbonite Backup Solutions

Carbonite E2 Appliance – what is it?

The carbonite E2 appliance is a physical server which sits on your premises, it is the local backup of your machines and you pay for your backup based on the size of the backed up data.

Using a Carbonite appliance will provide you with either 0.5TB or 1TB of local storage, with offsite storage and one year of retention included in the price.

The appliance uses AES-256 encryption server-side – meaning your data never leaves your organization in an un-encrypted form – your backups are HIPAA compliant with a Carbonite appliance!

What are the differences between Carbonite home + business products?

Carbonite home products are simple cloud backup solutions – designed to backup your data – the backup will allow you to download your data to a new machine, or back to the same machine in the event of a failure or malware infections – or – as is most likely, in the event of an accidental deletion.

Carbonite business products off the same backup and are controllable by your IT manager, your IT consultant and offer similar backup strategies, plus a whole lot more – you can backup your Exchange server, you SQL-Server databases, your Sharepoint server. You can run a mixture of local + cloud backup for faster recovery. The new Carbonite appliance with prices starting at $99/month will offer you any number of desktops backed up locally and you can even plan on bare-metal restore of computers – ie, you can backup the entire operating system!