![]() |
||||||||||||||||||||||||||||||
![]() |
![]() |
|||||||||||||||||||||||||||||
![]() ![]() ![]() ![]() ![]() |
||||||||||||||||||||||||||||||
Network Consulting
|
||||||||||||||||||||||||||||||
Network Security Consulting |
||||||||||||||||||||||||||||||
![]() |
||||||||||||||||||||||||||||||
As companies increasingly rely on the Internet, remote access, and new, sophisticated electronic commerce applications, they are increasingly concerned with safeguarding the security of the corporate network. Protecting your business against information theft, corruption, disclosure, and denial of service is becoming more difficult as the complexity of information networks continues to grow. Implementing security safeguards goes a long way towards protecting a corporation's assets from theft and intrusions. We offer a suite of security solutions to safeguard your network including: |
||||||||||||||||||||||||||||||
Security Policy and Security Plan Development: We assist you in creating a security policy that reflects the unique attributes of your enterprise. We can help you develop a security plan that will enforce the security policy. A documented and supported security policy is the first step towards securing an enterprise network. Enterprise Network Security Assessment: We evaluate the security posture of a network in the context of the current threat environment. We create a snapshot of your network architecture and identify vulnerabilities both internal and external to the network. Our Solutions works with you to formulate the security solution that best fit your specific requirements. Enterprise Intrusion Detection: We provide custom intrusion detection technology to recognize and respond to network-based attacks. Our will assist you with the selection of the optimal Intrusion Detection System (IDS) and its placement within your network. We can enhance your network operations center with a customized and installed intrusion detection component which will provide alarms, pinpoint the location of the attack, and analyze attempted break-ins - providing you with the means to take appropriate protective actions. Internet Security Vulnerability Assessment begins with our consultants investigating vulnerabilities of your network based on minimal information you provide, such as domain name or an email address. After researching the network, we assess system vulnerabilities using the latest technologies, including commercially available scanning tools. Additionally, we invite clients to observe as we conduct our assessment - either at an our facility or on the client site with their technical staff in attendance. As a result, customers gain a better understanding of the tools and techniques available today and of their own security vulnerabilities. Public Key Infrastructure (PKI) is an online infrastructure using encryption, digital signatures and digital certificates to secure applications, communications and transactions. The four basic security tenets addressed by PKI are authentication, confidentiality, integrity and non-repudiation. We have the capability to offer customized PKI solutions to meet customer needs over a wide range of networks, including corporate enterprise and Internet-based models. Token Authentication Consulting professionals work with organizations to provide maximum network access security to ensure that only authorized users have access to their networks, and that this measure is reflected in the organization's security policy. Passwords alone may be too weak. Strong, two-factor authentication, using a combination of two factors ensures a higher level of securing the authentication process. For clients with specific needs, we offer modular components of our standard services separately, including: Intrusion Detection Scan: We unobtrusively analyze the traffic present on a network, assessing how the network is currently used and potentially identifying specific cases of inappropriate use. Rogue Modem Identification: We discover potential unauthorized and unsecured access to corporate networks through Modem access. Vulnerability Scanning: We probe network devices to discover potential holes or vulnerabilities that may be the result of inappropriate configuration or insufficient application of vendor-supplied application patches. Security Policy Assessment and Development: We secure a network by strengthening an existing policy or, in the absence of a policy, drafting an initial policy. The end results are better configured routers and firewalls and an overall more secure operating environment. Firewall Analysis: We provide two distinct steps: automated analysis and manual analysis of the configuration tables. These analyses identify the current state of the firewall and offer specific recommendations for ensuring its security. |
||||||||||||||||||||||||||||||
![]() |
![]() |
![]() |
![]() |
|||||||||||||||||||||||||||
| home | | partnerships | | careers | | contact us | | site map | | ||||||||||||||||||||||||||
Copyright © 2000 Houston Technologies
Limited. All Rights Reserved.
|
||||||||||||||||||||||||||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |