Home About Us Strategic Consulting Clients Staffing Partners Education Careers  
Strategic Consulting
ACMHT Strategic Consulting group primarily provides Risk Management Consulting services for Global Fortune 500 enterprises as well as mid-size corporation.

Application Life Cycle Management: ACMHT service offerings address mainframe, distributed and cross-platforms Change Management Solutions. ACMHT is an IT services corporation that specializes in the Project Management and Architecture of complex Software Configuration Management (SCM) solutions for the software market leaders in the discipline: ChangeMan ZMF (Serena), AllFusion solutions (Endevor & Harvest) and SCLM, SCM Suites (CIG).

Regulatory Compliance Consulting: ACMHT Regulatory Compliance Experts are very knowledgeable in international as well as domestic governing laws such as Sarbanes-Oxley, GLBA, etc. as well as prevailing standards such as ISO-17799 and information assurance models such as COSO, COBIT, ITIL, etc. Through our methodology and years of compliance experience we bring the “best blend” of standards and information assurance models to bear on your regulatory compliance issues.

Healthcare Compliance Consulting: Our HIPAA Readiness Assessment framework is based on the Principal Lead Model. In the Principal Lead Model, it is the experienced personnel who do the work. Information Security Principals, each with 10 or more years of audit and security experience, lead and perform the entire engagement. The HIPAA Compliance Readiness Assessment framework provides the process to evaluate the current state of readiness for each of the 18 HIPAA compliance standards.

Data and Network Security Engineering: There are three parts to the model, namely people, process and technology. First look at who has access, who monitors system activity, who's doing administrative functions, and who has authorization to view, edit and change data and grant access. Then look at the process, such as what logs are being kept and when reviews take place. This phase requires an in-depth look at your policies and procedures, including how Human Resources personnel hire, train and review your staff. Only after these two key facets of your business are analyzed can the technology portion of the recommended solutions be determined. This three-pronged approach allows customized solutions to make sure that security measures are part of your company's overall process - not just a reaction to a breach.
Copyright © 2008 ACM Health Technologies. All rights reserved.