IT security

Right people. Right solutions.

Security


Vulnerability Assessment

Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. It is typically performed according to the following steps:
      1. Cataloging assets and capabilities (resources) in a system
      2. Assigning quantifiable value and importance to the resources
      3. Identifying the vulnerabilities or potential threats to each resource
      4. Eliminating the most serious vulnerabilities for the most valuable resources


Network Security

Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together. In many case the network security include the following softwares: Firewall, IPS/ID, Vlans, and so on...




Penetration Testing

A Penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, known as a cracker (though often incorrectly referred to as a hacker). The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution. The intent of a penetration test is to determine feasibility of an attack and the amount of business impact of a successful exploit, if discovered.

System Hardening

System Hardening is the process of evaluating a company's security architecture and auditing the configuration of their systems in order to develop and deploy hardening procedures to secure their critical resources. These procedures are customized for each business, updated as threats evolve, and automated for easy deployment and auditing. Hardening systems is a defense strategy to protect against attacks by removing vulnerable and unnecessary services, patching security holes, and securing access controls.