Security & Risk Management
Operational Technologies & ICS
Virtual CISO
IT Service Management
MSSP Services
Testimonials

About Us

Who We Are

We are an infrastructure security & ITSM focused organization, delivering secure, scalable, and cost-effective solutions to clients across the EU and North America. Safe Harbor leadership originated within the Calgary oil and gas industry, specializing in enterprise and operational technology. We maintain a strong partnership ecosystem with organizations such as Microsoft, Fortinet, VMware, DUO, Pager Duty, and Pure Storage, to name a few. We have adopted best practices which align with ITIL, The Open Group, NIST Framework, CIS Benchmarks, ISO 27001, and Sarbanes Oxley Audit Requirements.

Safe Harbor understands technology should enable business, not define the business. To support this approach, our solutions are always fit for purpose, and implemented with business agility, and total cost of ownership in mind.

Background

Core Partners

Mission

Provide cost effective technology services, while enabling organizations in the identification and delivery of business optimization initiatives.

Vision

To be the trusted first choice for technology services; deliver value through an optimized, client focused collaborative partnership.

Core Pillars

Increase Business Advantage

  • Add value as a low-cost operator
  • Deliver business driven solutions
  • Focused timely execution
  • Optimized IT investments

Business Enabler

  • Deliver data, integration & innovation
  • Drive business value through technology
  • Support the business plans & strategic goals
  • Deployment of pragmatic cloud-based solutions

Optimized End User Experience

  • Ensure secure remote Access
  • Provide optimized mobile workforce support
  • Support cyber security through awareness & training
  • Increase business / IT alignment
Decoration
Anna Keysell
Anna Keysell STRATEGIC ACCOUNT MANAGER

The strategic account management role strengthens our client relationships and encourages business growth. Anna focuses on long-term goals and the optimization of customer accounts, carefully cultivating mutually beneficial relationships, ensuring the timely and successful delivery of solutions. By directly leveraging internal SMEs and various technical resources, Anna develops a trusted advisor relationship with key accounts, customer stakeholders, and executive sponsors.

Decoration
Stephen Heaton Cyber Security Analyst

Safe Harbor leverages the ITIL 4 framework as the foundation of its ITSM services, this includes a range of processes that can be mapped to your organization’s IT Security Management strategy.

 

  • Service Request Management: This process can be used to manage requests for access to IT services, including security-related services, such as access to restricted data or systems.
  • Incident Management: This process is tied into our 24-hour monitoring, and can be used to manage security incidents, such as cyber-attacks, data breaches, or system failures that impact security.
  • Problem Management: The process can be employed to recognize and rectify the root causes of security incidents, vulnerabilities, or risks.
  • Risk Management: This process can be used to identify, assess, and mitigate security risks, including risks related to cyber threats, data breaches, or compliance issues.
  • Continual Improvement: This process can be used to ensure that security measures and controls are continually reviewed, evaluated, and improved to meet changing security needs.

 

Safe Harbor is available to help your organization establish a comprehensive approach to managing IT security, that is aligned with industry best practices and standards.

Get In Touch

Reach out to us today to jumpstart an optimized, client focused collaborative partnership.