SlideShare a Scribd company logo
1 of 14
Business VitalsIT Risk Management Services OverviewJanuary 2010
Agenda Company Overview IT Risk Management Services Overview Business Vitals Support Organization Why Business Vitals? Market Opportunity Discussion & Next Steps
Company Overview Business Vitals Headquartered in Columbia, SC Profitable Organization with Proven Business Model, Products/Services Strong Customer References                                      Portfolio 9th Year in Business SAS 70 Type II Audited
Customers
National & Local Recognition Ranked #296 on Inc. Magazine’s fastest growing list in 2006. Ranked 3rd within Information Security firms making the list. CRN Magazine’s 2005 Top 10 List of the Fastest-growing IT Security firms in the Country Entrepreneur Magazine's 2005 Hot 100 List of the Nation’s fastest growing companies. Elliott Davis and the South Carolina Chamber of Commerce on the South Carolina’s Fastest-growing Companies 2005 (#7) & 2006 (#26) Programs.
Company Mission & Values ,[object Object],To protect and insure the confidentiality, integrity and availability of our customers' business critical information by building and sustaining long-term, mutually-beneficial relationships based upon trust, proactive action, open communications and our team's ability to deliver high-quality IT Risk Management services. ,[object Object]
Integrity
Purpose
Accountability
Innovation
Continuous Improvement
Respect,[object Object]
Managed Security Services ,[object Object]
SPAM & Virus Filtering

More Related Content

What's hot

Cyber Liability Coverage - Chiropractic Malpractice Insurance
Cyber Liability Coverage - Chiropractic Malpractice InsuranceCyber Liability Coverage - Chiropractic Malpractice Insurance
Cyber Liability Coverage - Chiropractic Malpractice Insurancejessica01077
 
Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsSherWeb
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance BoosterMaëlle Piquée
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Maestro
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Managementjgatrell
 
Issp for Uadigitals 2019
Issp for Uadigitals 2019Issp for Uadigitals 2019
Issp for Uadigitals 2019Elena Peday
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
C:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionC:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionYustinus Simon
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Securitylaurenwhite
 
Cybersecurity & Data Challenges
Cybersecurity & Data ChallengesCybersecurity & Data Challenges
Cybersecurity & Data ChallengesJoão Bocas
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 

What's hot (20)

Cyber Liability Coverage - Chiropractic Malpractice Insurance
Cyber Liability Coverage - Chiropractic Malpractice InsuranceCyber Liability Coverage - Chiropractic Malpractice Insurance
Cyber Liability Coverage - Chiropractic Malpractice Insurance
 
Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulations
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Management
 
Compliance planning for hipaa 2
Compliance planning for hipaa 2Compliance planning for hipaa 2
Compliance planning for hipaa 2
 
Issp for Uadigitals 2019
Issp for Uadigitals 2019Issp for Uadigitals 2019
Issp for Uadigitals 2019
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
C:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_losspreventionC:\fakepath\wg xcs data_lossprevention
C:\fakepath\wg xcs data_lossprevention
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Cybersecurity & Data Challenges
Cybersecurity & Data ChallengesCybersecurity & Data Challenges
Cybersecurity & Data Challenges
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Sirius for business
Sirius for business Sirius for business
Sirius for business
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Andrew Warland
Andrew WarlandAndrew Warland
Andrew Warland
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 

Similar to BV Company Overview Web

Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega PresentationDarryl Santa
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Groupmbeck94
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Groupkejensen810
 
Omg, llc presentation 2-2015 sm
Omg, llc presentation   2-2015 smOmg, llc presentation   2-2015 sm
Omg, llc presentation 2-2015 smdarlenep12
 
How It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For SunHow It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For Sunvijaychn
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 
Implementing Collaboration And Social Computing Into The Enterprise Microsoft
Implementing Collaboration And Social Computing Into The Enterprise   MicrosoftImplementing Collaboration And Social Computing Into The Enterprise   Microsoft
Implementing Collaboration And Social Computing Into The Enterprise MicrosoftScott Carruth
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_BrochureCarolyn Tarrant
 
Kelly IT Resources Service Offerings
Kelly IT Resources  Service OfferingsKelly IT Resources  Service Offerings
Kelly IT Resources Service Offeringsstaciemarotta
 
Segue Capabilities Basic Overview Sep 2011
Segue Capabilities   Basic Overview Sep 2011Segue Capabilities   Basic Overview Sep 2011
Segue Capabilities Basic Overview Sep 2011DavidHart
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide shareSunera
 
Incedo - Corporate Overview
Incedo - Corporate OverviewIncedo - Corporate Overview
Incedo - Corporate Overviewtushar chhetri
 
A G S004 Smith 091707
A G S004  Smith 091707A G S004  Smith 091707
A G S004 Smith 091707Dreamforce07
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 

Similar to BV Company Overview Web (20)

Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
S bailey resume
S bailey resumeS bailey resume
S bailey resume
 
Alpha & Omega Presentation
Alpha & Omega PresentationAlpha & Omega Presentation
Alpha & Omega Presentation
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Group
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Group
 
Omg, llc presentation 2-2015 sm
Omg, llc presentation   2-2015 smOmg, llc presentation   2-2015 sm
Omg, llc presentation 2-2015 sm
 
How It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For SunHow It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For Sun
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Implementing Collaboration And Social Computing Into The Enterprise Microsoft
Implementing Collaboration And Social Computing Into The Enterprise   MicrosoftImplementing Collaboration And Social Computing Into The Enterprise   Microsoft
Implementing Collaboration And Social Computing Into The Enterprise Microsoft
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
 
Sherry d bailey resume
Sherry d bailey resumeSherry d bailey resume
Sherry d bailey resume
 
Kelly IT Resources Service Offerings
Kelly IT Resources  Service OfferingsKelly IT Resources  Service Offerings
Kelly IT Resources Service Offerings
 
Segue Capabilities Basic Overview Sep 2011
Segue Capabilities   Basic Overview Sep 2011Segue Capabilities   Basic Overview Sep 2011
Segue Capabilities Basic Overview Sep 2011
 
Sunera Business & Technology Risk Consulting
Sunera Business & Technology Risk ConsultingSunera Business & Technology Risk Consulting
Sunera Business & Technology Risk Consulting
 
Sunera business & technology risk consulting services -slide share
Sunera  business & technology risk consulting services -slide shareSunera  business & technology risk consulting services -slide share
Sunera business & technology risk consulting services -slide share
 
Incedo - Corporate Overview
Incedo - Corporate OverviewIncedo - Corporate Overview
Incedo - Corporate Overview
 
A G S004 Smith 091707
A G S004  Smith 091707A G S004  Smith 091707
A G S004 Smith 091707
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 

BV Company Overview Web