Services |
Network Security |
How secure is your data from hackers or disgruntled employees? Onsite IT has an extensive focus on providing value added Security Services. In general, our corporate experience includes:
Security Architecture Review. The purpose of this service is to identify risks associated with a client’s network architecture and to assess the ability of the current architecture to meet the client’s security needs, while still meeting functionality and throughput requirements. Vulnerability Scan (Internal and External). Automated tools are run against the client’s network segments to test for identified vulnerabilities. Scans can be run from an external perspective on those servers accessible from the public network as well as from an internal perspective focusing on those servers on the private network. This form of testing addresses vulnerabilities widely known to potential threat agents and it validates the application of known security defense postures used throughout the industry. Security Policy and Procedures. A security policy defines an organization’s strategy or priorities with respect to security, and serves as the driver for all security activities. The security policy is a high level statement of the organization’s security goals. Security operating procedures support the implementation of a security policy by providing detailed guidance for users and operators. We offer varying levels of services, depending upon the level of support requested. Security Host Hardening. The default installation of most operating systems is not secure. The Onsite IT host hardening service involves a security engineer systematically walking through the installed operating system (OS) and "locking down" or disabling specific services that are not required or have been compromised in the past. By performing these steps, the risk of compromise for the machine will be greatly diminished. Because every system is unique in some way, each has its own unique security settings that need to be tested before implementation. Hardening services are available for the MS Windows NT, MS Windows 2000, Sun Solaris, HP-UX and Linux operating systems. Secure Network Design Consulting. Onsite IT focuses on security in depth – layered security controls to meet customer security needs while having minimal impact on site functionality, throughput, and latency. Onsite IT security engineers are expert with the equipment, products and techniques used to construct secure web sites including: Selection, placement, configuration, and rule set determination for firewalls (e.g. Pix, Firewall-1, Raptor, Gauntlet and other market leaders) VPN configurations to interconnect corporate sites Remote access security including confidentiality and integrity controls, and associated cryptographic techniques and products High security authentication systems for remote access such as SecurID, Radius, TACACs etc., and Product Evaluations. Onsite IT has worked on and is continuing to work with commercial vendors of security-relevant products to evaluate products such as firewalls, databases, and network systems and components. This analysis gives us a good understanding of capabilities and limitations of products, both in general and for specific products and their competitors.
|
|