354 North Goodman Street
Rochester, NY 14607 USA
Phone: (888) 883-4891
Fax: () -
ISECURE is a woman-owned, IT Security company based in Upstate New York. Founded in 1995 as an ISP, iSECURE has extensive knowledge and practice in information technology, and has evolved into being an experienced, trusted and focused only on IT Security Solutions. Our multi-dimensional experience in IT Operations with a Security-focus gives us an edge that most other companies lack. We began our Security charge in these early ISP years, providing managed security services to customers collecating their servers in our datacenter. Our experience as a carrier gave us great insight into the concerns and hardships that today's infrastructures are exposed to. Clients have always leaned on us both for our expertise as well as our ability to listen and understand their needs.
iSECURE partners with cutting-edge manufacturers and security experts in the community. We are a value-added reseller for select industry-leading security products. We only add solutions to our line card that we have first tested and vetted in-house. Very few, if any, of our competitors do the level of testing regardless of their size. The iSECURE team is then confident to stand behind the manufacturers we partner with and our clients can trust that whatever we recommend is the best possible solution for their environment.
iSECURE's senior engineering team includes a combination of experience in Networking, Systems, Applications, Telecommunications, as well as Ethical Hacking and the military. Each member of our team has an average of ten years of experience in information security, and some have more than twenty years in Information Technology. We are certified and experienced in vulnerability assessments, penetration tests, HIPAA assessment as well as incident response. Our team of security advisors can white-board a solution design from scratch or review an existing network architecture to suggest improvements. The iSECURE engineering team has experience in planning, review, and/or execution with any stage of your security goals.