Pratum Blog

Integrity is now Pratum. We are the same company with the same owner and employess, but we've changed our name.

ANKENY, IA (October 3, 2017) - Integrity Technology Systems, Inc., Ankeny, IA -based information security consulting and managed security services firm, today announced the launch of its new identity. Effective immediately, Integrity Technology Systems, Inc., will operate under the name Pratum™.

"As our company grows nationally, yet remains rooted in the Midwest, we wanted to select a name and logo mark that properly communicates our brand," said Dave Nelson, owner and CEO. Pratum™, which in Latin means prairie, will be breaking ground on a new headquarters to accommodate additional staff as the business continues to see strong growth. Not-so-coincidentally, the new office building will be located on SW Prairie Trail Pkwy in Ankeny, IA.

The old name made it difficult to differentiate from the thousands of other US companies using a similar moniker. "We loved the name Integrity, but the name was ubiquitous and not in a good way. All types of organizations, from financial advisors to painters, are using it," explained Nelson. The name Pratum™ is unique and the rebrand affords the firm the ability to grow its national presence.

Pratum™, which will be celebrating its ten-year anniversary in 2018, helps customers solve information security challenges based on risk, not fear. The firm remains under the same ownership with the same portfolio of services, but along with the rebrand will come an increased focus on Pratum's Virtual Chief Information Security Officer (vCISO) offering. As the firm's flagship information security service expands nationally, Pratum™ will continue to grow its vCISO consulting team and remain vigilant about maintaining its open line of communication with clients. "We are as much a part of our vCISO client's business operations as their internal staff. It is our priority to provide them with quality security leadership and guidance when and where they need it," states Nelson.

Rebrand key elements:

  • Name and logo mark
    Pratum is the new name for Integrity. Cybersecurity and managed security services firm.
  • Website - Launching of pratum.com, the new website will showcase the Pratum™ brand and key services offerings.
  • New Corporate Headquarters – Pratum™ will be relocating to the District area of the growing Prairie Trail development in Ankeny, IA. The building, which will house only Pratum™, is designed to accommodate for the firm's growing team. Pratum™ is based in Ankeny, IA and has offices in Dallas, TX and Kansas City, KS.
    Pratum office building on SW Prairie Trail Parkway, Ankeny, Iowa.

Please contact us if you have any questions about Pratum.

Contact Pratum
Secure Iowa Conference 2017 Keynote Speaker Lieutenant Colonel Robert J. Darling United States Marine Corps (Ret.)

Iowa’s Largest Information Security Conference Lands One of Its Most Exciting Speakers to Date

Date: Tuesday, October 3, 2017

Location: FFA Enrichment Center, 1055 SW Prairie Trail Parkway, Ankeny, Iowa 50023

Secure Iowa Conference, the annual Iowa-based information security conference hosted by ISSA Des Moines and presented by Pratum, has announced that its 2017 keynote speaker will be Lieutenant Colonel Robert J. Darling United States Marine Corps (Ret.), author of 24 Hours Inside the President's Bunker. Lieutenant Colonel Darling is the White House Airlift Operations Officer who, during the attack on America on 9/11/01, responded to the underground White House Bunker Complex and stood shoulder to shoulder with America’s highest leaders as they made unprecedented crisis leadership decisions on behalf of all Americans.

In his keynote presentation September 11, 2001 - The White House, A Crisis Leadership Presentation, Retired Lieutenant Colonel Robert Darling will discuss his experiences on September 11, 2001 inside the White House bunker, where he worked alongside Vice President Dick Cheney and National Security Advisor Condoleezza Rice. His presentation is designed to ensure we, as a nation, never forget the events of 9/11/01, and to inspire all leaders to take the necessary steps within their power to protect and safeguard their employees, their organizations and their communities.

Secure Iowa Sessions

Lieutenant Colonel Darling will undoubtedly deliver an inspiring presentation, but he is only the beginning of an exciting day filled with continuing education in the areas of information security, IT risk management, compliance and privacy. The following is a list of session tracks, which will feature various speakers throughout the day. Attendees may attend any of the presentations. Selecting a track is not necessary… the tracks are simply created to help guide attendees in their selection process.

SESSION TRACKS
  • Application and Infrastructure Security
  • Security Testing and Investigation
  • IT Risk Management and Audit
  • Executive and Legal

This a unique opportunity for security, privacy and audit professionals in Iowa to gather for a time of education and networking. For more information, visit SecureIowaConference.com.

Register for FREE

Make sure to register soon, spots are filling fast.
IT Controls Gap Analysis

When someone says they are getting ready to do a gap analysis of an IT systems, what’s the first thing that comes to mind? Compliance, SOX, HIPAA, log management, change control, identity management? While all of these are valid considerations, they should not be the first.

The Importance of Processes

Process should be the starting point for every review. Without a process, systems are worthless. For instance, if you have a log management system but no process that defines who reviews logs, what they should look for and what actions to take, the technology is useless. Priority should be placed on the maturity of the process. This includes policy, procedures and overall documentation.

It happens time and time again. An outage occurs because a simple procedure was not followed. Perhaps the procedure wasn’t documented or wasn’t documented well. Maybe the procedure exists but nobody knows about it. These types of issues display a lack of maturity, which no amount of technology can fix. Organizations should begin to place more importance, and thus resources, on improving their process.

Technology will only take you so far with security and compliance. In fact, at times technology will mask poor processes, which may complicate problems in the future.

5 Questions to Ask During a Gap Analysis

If you are a CIO, CTO, VP, Director or Manager of a technology group, I implore you to sit down as a leadership team and review the following 5 items.

  • Do we have a policy which dictates the design, implementation, management and review of our systems?
  • Do we have a repository of procedures and associated documentation to carry out this policy?
  • Are team members well educated in the existence, importance and location of this information?
  • Is someone responsible for managing this repository and performing periodic reviews as our technology and business process evolves?
  • Is there a system in place to identify and correct actions not in line with our process?

If more of this activity were to take place, I’d venture to bet companies would spend less time trying to fit various security technologies into their organization and more time finding technology that complements their existing way of doing business.

Get our blog posts delivered to your inbox: