|
|
Home >> Services >> Consulting Services > Security Services |
|
|
With Intelligent Technology Solutions Security services offering will help you quickly to find and fix security holes that endanger your business infrastructure. Using comprehensive automated security risk detection and analysis solutions from Internet Security Systems, Inc., Intelligent Technology Solutions security experts assess your basic Internet configuration, including communication services, operating systems, key applications and routers. You get a detailed report identifying vulnerabilities, prioritizing security risks, and recommending a plan of action. Internet Security Health check supports a variety of Microsoft Windows NT, windows 2000 and UNIX-based configurations, including:
Intelligent Technology Solutions uses a multi-layered approach to security that involves:
These different layers act cohesively together to create a secure environment for each customer. Intelligent Technology Solutions can provide each customer with a secure, private environment, maintaining the highest levels of security, performance, and privacy for both data and systems. IT Security Assessments Are your networks secured? The truth of the matter is this question cannot be answered with any degree of certainty unless your systems are either compromised, or preferably assessed/tested for vulnerabilities. Intelligent Technology Solutions offers a variety of services to evaluate the hardened stance of a “secured” IT infrastructure, serving to validate or invalidate the perceived security posture. Vulnerability Assessments: A vulnerability assessment is a process that defines, identifies and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. In addition, vulnerability assessments can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are implemented. Vulnerability Assessment - Complimentary Intelligent Technology Solutions CONVERGESolve Secure Networks offers a complimentary vulnerability assessment of 1 to 5 of an organization’s publically facing IP addresses. This assessment is a snapshot of a small portion of the environment and presents a high level insight as to the security posture. Optimally, we recommend a full vulnerability assessment of the entire network to present a more complete picture of the security posture and begin to correlate the organization’s standing with regard to various industry compliance requirements. Intelligent Technology Solutions has conducted more than 100 complimentary vulnerability assessments of 1 to 5 IP addresses per client. Alarmingly, less than 2% of client networks assessed passed with no known vulnerabilities. One network was cited with over 1,400 vulnerabilities associated with a single IP address. Full Vulnerability Assessment During a full network vulnerability assessment, a security engineer will scan both the internal and external network looking for any known vulnerabilities that exist in the client infrastructure. The engineer will further test to attempt to rule out any false positives. Engineers will conduct social engineering, testing the company’s employees for adherence to information security/privacy best practices. Often, employees are not properly trained on information security and social engineering testing will validate their training. Finally, the assessment will include a compliancy audit, ensuring the organization is complying with any relevant regulations or standards like; GLBA, HIPAA, PCI-DSS, or ISO27001. These assessments can be conducted on-site or remotely, with on-site assessments also including a physical security review. Network Penetration Testing Network penetration testing is taking a vulnerability test to the next level and is a close simulation to a real world hack available. During a network penetration test a security engineer/ethical hacker will first scan the network for vulnerabilities and exploit those vulnerabilities to gain access to systems. From there the engineer will gain access to sensitive information or if allowed by the SOW, leave a marker to prove that they gained access. In many penetration tests, the engineer will use a tactic called pivoting to gain access through the perimeter on non-sensitive system and launch attacks on critical systems from the non-sensitive system behind the firewall. Web Application Penetration Testing Many companies have custom web apps that were developed in house or by a third party. These apps are typically not tested before they are deployed to see if any security holes exist. During a web application penetration test a security engineer/ethical hacker will attempt to gain access to the application as an authenticated user, using various testing means to attempt to extract or manipulate data in the application. It is best practice to have a web application penetration test before deploying any new applications.
|
|
||||||||||||||||