Common Security Services:
|
Internet Security Checkup
- This service provides a complete search from the Internet into your site.
We check your DNS listing, your addressing scheme, your routers, your hosts
outside your firewall or on the DMZ, and the firewall itself. We
provide you with an inspection report and ways to improve your security.
|
Internet Security Test
- This service provides a complete security test from the Internet into your site.
We test your routers, hosts outside your firewall or on the DMZ, and
the firewall itself. Then we attempt to penetrate into your corporate
site and break in to your proxy servers and workstations. As we conduct
these tests we document exactly what each test is and what the result is.
These tests will utilize hundreds of protocols and ports including
TCP/IP, SPX/IPX, netbios, and appletalk.
|
Application Penetration Testing
- This service provides independent security verification testing
for companies which have developed Internet or Intranet applications
and want to know how secure they are before they field them to production.
We follow a 35 point inspection which tests the ability to create buffer
overruns, ad hoc database queries, and other random data access penetration.
|
Network Security Assessment
- This service provides a review of your current corporate network (LAN/WAN)
from a security perspective. It consists of a requirements definition, old
and new topology diagrams, router and firewall security filter recommendations,
system administration security definition, virus handling procedure definition,
and branch office security review and recommendations.
|
Firewall Review
- The Firewall Review is a service for those companies who either need a
firewall for the first time, or who are looking to upgrade their existing
firewall. It captures the user requirements and then maps those requirements
against each of the major brands of firewalls. After the preferred firewall
has been identified, the report goes on to define the hardware and software
requirements and cost. Finally, a schedule is presented with step-by-step tasks
that are required to install a firewall.
|