JKI Computer Security

JKI Computer Security provides the small to medium size business markets with advanced computer and network security services. With over 30 years of technology experience in building secure computing architecture JKI Computer Security delivers security solutions for cloud, on-premise, and hybrid computing environments.

Our philosophy is to work closely with our clients to deliver quality projects as designed on time, within budget, and as scoped. We provide consulting for managed service solutions including the planning, installation, operation, and management of networking, computer, information security, and identity management for our clients.

JKI Computer Security provides services on contract, hourly, or as pre-paid blocks of time.

Our staff is fully certified in cybersecurity and cloud security with certifications from ISACA, ISC2, and AWS. We have Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Certified Solutions Architect Associate (AWS), and Certified Security Specialty (AWS) professional staff on board and ready to assist.

For further information and free Cyber Protection Information contact us at info@jkics.com or Call (386) 218-4448.


‘Cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.’

  • Endpoint Protection – Malware Prevention
  • Intrusion Prevention & Detection
  • Vulnerability Assessment
  • Network Security and Controls
  • Threat Hunting
  • Risk Assessment and Management
  • Asset Identification and Ranking
  • Application and Database Protection
  • Encrypt Data at Rest and in Motion


‘A broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing.

  • Virtual Private Cloud
  • Web Application Firewalls
  • Access Control Lists
  • API Management
  • Log Capture and Analysis
  • S3 Security and Control
  • Network Access Controls
  • Application Authorization and State Management


‘The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.’

  • Data Classification
  • Data Lifecycle Management
  • Identity Authentication Management
  • Access Control Authorization
  • General Data Protection Regulation
  • NIST Privacy Framework