Search For:

  • Use commas to separate words/phrases
    e.g.: gold drill equipment, drilling equipment

Search In:

Search Sectors:

View this profile in: Français
Company:
Sabytel Technologies
Website:
Location:
  • 300-116 Albert St
  • OTTAWA, ON
  • K1P5G3

Contact Information

Telephone:
613-235-9999
Alternate Telephone:
Fax:
343-887-9388
Email:
al@sabytel.com
Year Established:
2006-09-01
Industries Classification:
541510  Computer Systems Design and Related Services
541619  Other Management Consulting Services
611430  Professional and Management Development Training
611690  All Other Schools and Instruction
541990  All Other Professional, Scientific, and Technical Services
Updated on:
2016-09-23,  Industry Canada
You must have a valid Industry Canada username and password to modify your company information.
Update Profile
Sabytel Technologies

Company Profile

IT Security Services: Complete End-to-End Security Assessment and Authorization. Sabytel provides start-to-finish analysis and documentation for corporate security certification and accreditation compliance for both public and private organizations. Identity Management: Sabytel has the experience, knowledge and expertise to provide you the guidance necessary to identify, implement and manage the right Identity management solution for your business. Vulnerability and Penetration Testing: Sabytel has qualified resources available to help you determine which assessment method is right for your business and who also have the expertise, training and certifications to carry out the objective. Incident Management: The Sabytel Team holds the knowledge, skill and training to either manage incidents for your business as they occur or provide you with the documentation and process’s necessary for you to manage, maintain and irradiate the incident internally. Training: In partnership with the Professional Evaluation and Certification Board (PECB), NISKAA Group Provides the PECB full ISO training courses and exams worldwide.

Products/Services

  • IT Security Services Complete End-to-End Certification and Accreditation (also known as Security Assessment and Authorization). Sabytel provides start-to-finish analysis and documentation for corporate security certification and accreditation compliance for both public and private organizations. We have expertise in assessing data sensitivity, privacy act compliance, vulnerability assessments, threat and risk assessments, security architecture design and assessment and policy & procedure development and implementation. Everything you need to assure yourself you’re protecting your information adequately.

  • Security Assessment and Authorization (SA&A) Complete End-to-End Certification and Accreditation (also known as Security Assessment and Authorization). Sabytel provides start-to-finish analysis and documentation for corporate security certification and accreditation compliance for both public and private organizations. We have expertise in assessing data sensitivity, privacy act compliance, vulnerability assessments, threat and risk assessments, security architecture design and assessment and policy & procedure development and implementation. Everything you need to assure yourself you’re protecting your information adequately.

  • Certification and Accreditation (C&A) Complete End-to-End Certification and Accreditation (also known as Security Assessment and Authorization). Sabytel provides start-to-finish analysis and documentation for corporate security certification and accreditation compliance for both public and private organizations. We have expertise in assessing data sensitivity, privacy act compliance, vulnerability assessments, threat and risk assessments, security architecture design and assessment and policy & procedure development and implementation. Everything you need to assure yourself you’re protecting your information adequately.

  • Harmonized Threat and Risk Assessment (HTRA) (TRA) Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Sensitivity Analysis Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Statement of Sensitivity (SoS) Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Concept of Operations (COO) Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Privacy Impact Assessment (PIA) Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Service Level Agreements (SLA) Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Memorandums of Understanding (MOU) Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Security Policy Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Security Procedures Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Business Impact Assessment (BIA) Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Gap Analysis Sabytel provides individual and tailored documentation which can easily be integrated within your overall security plan. We specialize in sensitivity analysis, Threat and Risk Assessment, architecture design, concepts of operation, Privacy Impact Assessment, Service Level Agreements & Memorandums of Understanding, Security Policies and Security Procedures, Business Impact Assessments as well as detailed Gap Analysis based on your input factors. Sabytel holistic approach to Information/IT Security is a globally effective process and solution.

  • Disaster Planning Organizations cannot always avoid disasters, but with careful planning the effects of a disaster can be minimized. The objective of a disaster recovery plan is to minimize downtime and data loss. The primary objective is to protect the organization in the event that all or part of its operations and/or computer services are rendered unusable. The plan minimizes the disruption of operations and ensures that some level of organizational stability and an orderly recovery after a disaster will prevail. Sabytel can provide you with the right plan for your business; subsequently permitting you to rest and relax when not in the driver’s seat.

  • Business Continuity Planning (BCP) Organizations cannot always avoid disasters, but with careful planning the effects of a disaster can be minimized. The objective of a disaster recovery plan is to minimize downtime and data loss. The primary objective is to protect the organization in the event that all or part of its operations and/or computer services are rendered unusable. The plan minimizes the disruption of operations and ensures that some level of organizational stability and an orderly recovery after a disaster will prevail. Sabytel can provide you with the right plan for your business; subsequently permitting you to rest and relax when not in the driver’s seat.

  • Security Program Assessment Information Security Management (ISMS) is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. ISO/IEC 27001 ISMS can help small, medium and large businesses in any sector keep information assets secure.

  • Certification to Information Security Management (ISMS) Information Security Management (ISMS) is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. ISO/IEC 27001 ISMS can help small, medium and large businesses in any sector keep information assets secure.

  • Cloud Computing Services Sabytel will assist organizations to safely and confidently leverage secure cloud computing services and solutions. Rather than adopting the unique and sometimes unknown security practices and policies of each cloud vendor, Sabytel will provide guidance to businesses so that they may extend and apply their own access and security policies into the cloud by securing all the data traffic moving between the enterprise and the cloud, as well as data being stored in the cloud.

  • Risk Management An effective risk management process is an important component of a successful IT security program. The principal goal of an organization’s risk management process should be to protect the organization and its ability to perform their mission, not just its IT assets. Sabytel has resources who hold the knowledge, and experience of risk management that your business needs. They will tailor a risk management plan which can be incorporated into your IT Security plan and will suit your business needs. Sabytel will provide your business with the information and tools you need to effectively manage the security risks associated with your information and IT assets.

  • Risk Mitigation Planning An effective risk management process is an important component of a successful IT security program. The principal goal of an organization’s risk management process should be to protect the organization and its ability to perform their mission, not just its IT assets. Sabytel has resources who hold the knowledge, and experience of risk management that your business needs. They will tailor a risk management plan which can be incorporated into your IT Security plan and will suit your business needs. Sabytel will provide your business with the information and tools you need to effectively manage the security risks associated with your information and IT assets.

  • Identity Management Electronic identity can be a primary enabler to moving high-value eGovernment/eBusiness services online in order to reduce the costs of service delivery. Implementing identity management systems and associated best practices in your organization can give you a real competitive advantage in a number of ways. Sabytel has the experience, knowledge and expertise to provide you the guidance necessary to identify, implement and manage the right Identity management solution for your business.

  • Vulnerability Analysis / Vulnerability Assessment Sabytel has qualified resources available to help you determine which assessment method is right for your business and who also have the expertise, training and certifications to carry out the objective. Not only are Sabytel resources conversant with the common methodologies of North America (SANs, NIST, Special Publication 800-40 (Creating a Patch and Vulnerability Management Program); and CSEC, ITSG-22, Baseline Security Requirements for Network Security Zones (Vulnerability Management Controls) they are also knowledgeable with the European Union Agency for Network and Information Security (ENISA) Vulnerability Handling Handbook.

  • Penetration Testing Sabytel has qualified resources available to help you determine which assessment method is right for your business and who also have the expertise, training and certifications to carry out the objective. Not only are Sabytel resources conversant with the common methodologies of North America (SANs, NIST, Special Publication 800-40 (Creating a Patch and Vulnerability Management Program); and CSEC, ITSG-22, Baseline Security Requirements for Network Security Zones (Vulnerability Management Controls) they are also knowledgeable with the European Union Agency for Network and Information Security (ENISA) Vulnerability Handling Handbook.

  • Incident Management Without effective incident management an incident can rapidly disrupt business operations, information security, IT systems, employees or customers and other vital business functions. The Sabytel Team holds the knowledge, skill and training to either manage incidents for your business as they occur or provide you with the documentation and process’s necessary for you to manage, maintain and irradiate the incident internally.

  • ISO Training / IT Training In partnership with the Professional Evaluation and Certification Board (PECB), NISKAA Group Provides the PECB full ISO training courses and exams worldwide.

Back to Top