Information Security

It's no secret today's computing environment is risky. An ever-changing flood of acronyms, exploits, jargon and policy can leave an organization at risk greater than its value. We offer a unique, custom approach to securing your environment, so your secrets don't become someone else's.

WHAT WE DO

Endpoint Security

The Most Secure Endpoint Available on the Market.

Learn More

PHYSICAL SECURITY

• Video Surveillance • Archive Storage • Entry Access

Learn More

NETWORK SECURITY

• Network Assessments • Penetration Testing • Ethical Hacking

Learn More

GOVERNANCE

• Risk • Compliance • Business Continuity

Learn More

THERE'S NO SUBSTITUTE FOR EXPERIENCE. SECURITY IS NOT JUST A FIREWALL. IT'S NOT A WIDGET, TOOL OR MAGIC BULLET. SECURITY HAS MANY ASPECTS AND DCI CONSIDERS THEM ALL - AND HOW THEY IMPACT YOUR BUSINESS.

200+

IT CERTIFICATIONS HELD

> 5.2 M

MAN HOURS
WORKED

16+

Premier Vendor
Product Lines

 INNOVATION WITH THESE PRODUCTS

ENDPOINT SECURITY

Bromium: Virtualization revolutionized the data center; Micro-virtualization is revolutionizing security for your mobile workforce.

Endpoint Security (vSentry)
Micro-Virtualization
Live Attack Visualization and Analysis (LAVA)

CISCO

Leveraging Cisco ASA platforms and services, DCi can integrate information security into your Cisco collaboration infrastructure.

 

ASA Platform
Integrated Security

JUNIPER

High performance network security with advanced integrated threat intelligence.  Security management for centralized policy control.

SRX Series
Firefly Perimeter / vSRX
Junos Space Security Director

TREND MICRO

Best in Class anti-virus and centralized management.

Anti-Virus
Centralized Management

CHECK POINT

Secure the future with the latest in firewall technology.

Firewalls
Perimeter Security

PULSE SECURE

Pulse Secure: VPN solutions for securely connecting to the corporate network.

Remote Connectivity
Mobile Workforce