Enterprise Security policy assessment and compliance, translating written policies to e-policy, developing e-polices from system baselines, risk assessments and penetration test assessments, incorporate structured monitoring points in order to assess critical and weak systems; strategic consulting and business plan for proposed security solutions.