

About Kimmell Cybersecurity & Forensic Services
What is the Kimmell difference?
We manage IT systems with Confidentiality, Integrity & Availability of data equally considered.
Best in Industry Response & Resolution Times
Around-the-clock support, even on the weekends
End Points Secured
Breaches Prevented
Firewall Rules Reviewed
What can Kimmell Cybersecurity do for you?
OUR SERVICES
Enterprise Security Policy, standards and procedures are the cornerstone of an effective organization. They provide direction that every person in the organization can use in a variety of ways.
Policies and procedures must be updated and modified as business, regulatory and enforcement events dictate; and they must be maintained in compliance with record-keeping requirements including the time period each policy was in effect. Periodic testing of policies is essential to ensure they are effective.
We help in analyzing your company’s existing policies, procedures and standards and provide recommendation to improve them by comparing them to the best practices in the industry to strengthen your defense.
As a Managed IT and Services Provider of your company we offer 24/7 monitoring, managing and/or problem resolution for all the IT systems within the business.
Our services as an MSP include but are not limited to:
- Provisioning new devices and new accounts when needed.
- Account management
- Vendor Security Management
- Service availability monitoring
- Standard hardened configurations
- Managing the DNS records
- Backup Monitoring
- Keep IT Asset Inventory up-to-date
- Software Licensing
- Incident Response as needed
- Help Desk tickets resolution
We perform an independent, enterprise wide assessment of corporate security to understand existing information security and process controls.
- Enterprise Wide Policy – We will assess your IT and related policies and procedures
- Enterprise Security Staffing – We review current security staffing for adequacy
- IT Asset Management – Analyze the life of IT Assets in your organization
- Personnel Security – From Onboarding to Access
- Physical Security – How well are your organization’s assets protected
- VOIP and Mobile – Communication mediums can be a weak point
- Network Security – This is a high-risk area that involves overall network design and detail network device configuration assessments.
- Application Security – Applications and especially custom applications can contain high risk vulnerabilities.
- Business Continuity and Disaster Recovery
- Cybersecurity Awareness Training Program
- Incident Response Plan
- Information Systems Core Security
- Internet Connectivity and Operations
- Cloud Computing
- Regulatory and Compliance and more!

Our Team
Meet the Kimmell Team

Principal & Cybersecurity Consultant
Brett Kimmell
He has a Masters in Accounting Information Systems and holds multiple IT Security Certs: CCA, CCP, CISSP, CISA, CISM, CPA, CITP.

Partner & Senior Cybersecurity Consultant
Abdullah Alkhulaiwi
His experience includes ethical hacking, complex network design and information security assessments. RP, Security +
Client Testimonials

CFO of Insurance Co
Cleveland, Ohio
We are appreciative of their technical expertise and reliable service. Kimmell Cybersecurity has truly become our partners in IT.

United Way - VP
Akron, Ohio
The company also worked with our IT team to test the fixes and ensure that the software retained its integrity and functionality. Their response time as almost instantaneous and we were very pleased with their work.”

B2B Co - CFO & Partner
Cleveland, Ohio
Kimmell Cybersecurity was brought in and efficiently and cost effectively assessed our enterprise information systems to strengthen controls and reduce potential exposure. Their report was timely and included priority action steps.
What's Up
Recent News