IT Security Services
Information Security Solutions

Access
- Risk Assessment
- International Standards Compliance
- IT Architecture Design & Review
- Attack & Penetration
- Web Application Security
- Security Code Review (SC)
- Wireless Security
- Host Security (End Point Security)
- Database Security
- Incident Response

Guide
- Organizational Information Security Strategy
- Organizational Policy Procedures & Definition
- Secure Technical Design

Protect
- Perimeter Security
- Content Security
- Intrusion Prevention
- Secure Authentication (PKI)
- Secure Remote Access
- Enterprise Application Infrastructure
- Operating System Hardening and Baselining
- Patch & Update Management
- Total Disk Encryption
Vulnerability Assessment (VA)
Enterprise Security Audit
Security Code Review (SC)
Application Security Audit
- Initial ASA (remote)
- Comprehensive ASA (onsite)
Penetration Testing (PT)
Penetration testing is the testing of networks and their components for security weaknesses. Our consultants could carry these tests with no knowledge of the network, or as authorized users having restricted knowledge of the network. The test is conducted remotely via the Internet on the IP address, the URL specified by the client, or at the client site (for internal penetration testing).
- Light perimeter test — Testing the strength of the perimeter from a remote location.
- Full perimeter test — Verifying the security of the perimeter, the servers in the DMZ with remote exploitation of DMZ and accessible internal systems.
- Internal test — The ‘trusted insider’ test, where our consultants launch this test from inside the client’s network, with internal exploitation.