Archive for the ‘Enterprise Tech Infrastructure’ Category

VIMRO, LLC - Michael Horsch Fizz
How do you truly know that your critical data and infrastructure are secure? VIMRO can answer this question with our Security Testing and Assessment (ST&A) services. According to NIST SP 800-115 – Technical Guide for Security Testing and Assessment, an information security assessment is the process of determining how effectively an entity being assessed (e.g., host, system, network, procedure, person, etc—known as the assessment object) meets specific security objectives.

VIMRO uses three types of assessment methods to accomplish this: testing, examination, and interviewing.

    • Testing is the process of exercising one or more assessment objects under specified conditions. This is used to compare actual and expected behaviors.
    • Examination is the process of checking, inspecting, reviewing, observing, studying, or analyzing one or more assessment objects to facilitate understanding, to achieve clarification, or to obtain evidence.
    • Interviewing is the process of conducting discussions with individuals or groups within an organization to facilitate understanding, achieve clarification, or identify the location of evidence. Assessment results are used to determine security control effectiveness over time.
    VIMRO has extensive experience in ST&A for both commercial and government enterprise and clouds-based ecosystems.


Download Advanced Cyber Security Overview PDF

“VIMRO’s Security and Networking Solutions and Services focus on measurable results and outcomes. Leveraging multidisciplinary teams comprised of handpicked experts, we design and implement a strong security and networking strategy. We are dedicated to delivering solutions and services that deliver the greatest business value for our clients.”

Vadim Hiekin, Founder and CEO

VIMRO – Advanced Security and Networking PDF


Michael Horsch Fizz, CBDO 617 299 8510

Michael Horsch Fizz, CBDO
617 299 8510

Read Full Post »

A Poll for Cloud Computing Security Experts!

Read the December 2013 Excerpt from below in red

How accurate was the December 2013 “Predictions For 2014: Cloud Computing – Security”?

Predictions For 2014: Cloud Computing – Security

“Perimeter security will shift outside the perimeter, where it belongs. The combination of cloud and mobility, predicted and proven in 2013, means there’s no longer a perimeter to your business that you can control. Even if you tried to enforce perimeter controls, they would not For CIOs be very effective, as so much of the work is shifting outside your perimeter to the public cloud. Additionally, users have so many devices now that you can’t enforce device security such as network access control (NAC), as the management overhead is too daunting. The focus needs to shift from protecting the network and the devices to protecting the data. With the network perimeter shrinking and the devices proliferating, your data is the one thing you can control.  

What you should do about it: For enterprise clients, this means asking cloud providers and your developers — who will configure virtual networks on cloud platforms — how the network is designed so you can gain assurance that your data isn’t just being thrown willy-nilly into a “cloud.”  The next step is getting familiar with data-centric security tools that work in and outside your walls. For cloud providers, this means using Zero Trust design principles to design the network.   Zero Trust networks put the controls close to the data and support multitenancy as well.”


Read Full Post »


If you are a current FCI client, Schedule your Consult Online or call (617) 500 7410

Read Full Post »

“Real gross domestic product — the output of goods and services produced by labor and property located in the United States — increased at an annual rate of 0.1 percent in the first quarter (that is, from the fourth quarter of 2013 to the first quarter of 2014), according to the “advance” estimate released by the Bureau of Economic Analysis.  In the fourth quarter, real GDP increased 2.6 percent.”  source:

For FCI and GLG clients, schedule your consult to review how this specifically impacts current and expected tech spending in the enterprise space.


The full text of the release on BEA’s Web site can be found at

Read Full Post »

Vendor: Citrix

Minor WINS.  Critical ERRORS.  What’s NEXT?SWOT /  what is next?

Availability Date: 05/01/2014

Current FCI clients: Verbal SWOT reviews are available through your secured login.

Online Scheduling App: 1)  Select Service “Vendor SWOT Review” 2) Select Advisor “Michael Horsch Fizz”.

SWOT  price start at  $2,200.00
SWOT reviews by request available for most TECH Vendors.

FCI Clients must schedule all consults directly with FCI

GLG Clients must schedule all consults directly with GLG

Read Full Post »

Michael Horsch Fizz:

Enterprise Tech Infrastructure sales data available – 04/03/2014 includes updated Q2 2014 macro expectations..

Originally posted on Michael Horsch Fizz:


AVAILABLE   March 24th, 2014 for current FCI and GLG Clients.
Very Limited Time Slots!  Schedule your consult now!

FCI Clients: Schedule your consult directly with Michael

GLG Clients: MUST Schedule your consult with GLG

View original

Read Full Post »


AVAILABLE   March 24th, 2014 for current FCI and GLG Clients.
Very Limited Time Slots!  Schedule your consult now!

FCI Clients: Schedule your consult directly with Michael

GLG Clients: MUST Schedule your consult with GLG

Read Full Post »

Older Posts »


Get every new post delivered to your Inbox.

Join 201 other followers

%d bloggers like this: