Not a vulnerability scan but real hackers ...

Assessment Services


Penetration Testing
  • Identifies weak points in your network, systems, and applications

  • Proven methodology with information gathering, vulnerability identification, vulnerability exploitation, and escalation

  • Testing perimeter networks, internal networks, web applications, mobile applications, and enterprise applications

  • Not a vulnerability scan but real hackers attack your network

Social Engineering Testing
  • Identifies weak points in people and processes

  • Proven methodology with information gathering, scenario preparation, and campaign execution

  • Testing people with media drops, phishing emails, and phone calls

  • Not a set of canned, one-size fits all scenarios

Managed Security Services


Threat Detection System
  • Situational awareness for suspicious activity like policy violations, outside influence on your network, and risky user behavior

  • Real-time, 24x7x365 expert analysis and response to known and emerging threats

  • Proven methodology with characterize flows, profile hosts, and determine disposition

  • Accepts input from packet filters, traditional firewalls, and next-generation firewalls

Managed Firewall
  • Situational awareness for suspicious activity like policy violations, outside influence on your network, and risky user behavior

  • Real-time, 24x7x365 expert analysis and response to known and emerging threats

  • Proven methodology with characterize flows, profile hosts, and determine disposition

  • Managing packet filters, traditional firewalls, and next-generation firewalls

  • Handling performance, upgrades, patches, policies, and signatures

Managed IPS
  • Situational awareness for malicious activity like scans, exploitation attempts and post-exploitation remote access

  • Real-time, 24x7x365 expert analysis and response to known and emerging threats

  • Proven methodology with characterize flows, profile hosts, and determine disposition

  • Managing Intrusion Detection Systems, Intrusion Prevention Systems, and Endpoint Detection and Response

  • Handling performance, upgrades, patches, policies, and signatures

SANS Top-20




Top Ten Network Security Tips


Wondering what the "best practices" are for securing your network? There is a very informative document called "The 60 Minute Network Security Guide" on the National Security Agency Web site (www.nsa.gov). Here's a brief summary ...