Technology Security Assessments


The purpose of a Technology Security Assessment is to identify security weaknesses within your corporate network and Internet architecture. We use proprietary and commercial tools to assess the security of your network infrastructure, host-based systems and applications. This service offering is geared towards companies who want to quickly identify and correct security weaknesses in their information technology environment.
  • Policies and Procedures Gap Analysis
  • Penetration Analysis
    • External Penetration
    • Internal Penetration
    • Remote Access Penetration
    • Intrusion Monitoring and Detection Analysis
  • Network Infrastructure Security Assessment
    • Routers
      • Cisco
      • Nortel / Bay Networks
    • Switches
      • Cisco / Arrowpoint
      • Foundry
      • Nortel / Bay Networks
    • Firewalls
      • Checkpoint FireWall-1
      • NAI Gauntlet
      • Cisco PIX
      • Axent Raptor
      • Netscreen
    • Intrusion Detection Systems (IDS)
      • ISS RealSecure
      • Axent NetProwler / Intruder Alert
      • Cisco Netranger
      • NAI CyberCop Monitor
      • Network Flight Recorder (NFR) / Tripwire
    • Virtual Private Networks (VPN)
      • RedCreek
      • Network Alchemy
      • Cisco
      • Nortel
      • Ssh
      • Aventail
      • Checkpoint VPN-1
      • Netscreen
    • Public Key Infrastructures (PKI)
      • Entrust
      • Baltimore
      • VeriSign
      • Cylink
  • Host-Based Security Assessments
    • Windows NT
    • Windows 2000
    • Solaris
    • HP-UX
    • AIX
    • Linux
    • BSD
    • DEC UNIX
    • SCO UNIX
    • NetWare
  • Application Security Assessments
    • Web Servers
      • Apache
      • Netscape Enterprise Server (NES)
      • Microsoft Internet Information Server (IIS)
      • Jserv
      • Java / Javascript / ActiveX / CGI / Perl / VBScript
    • Databases
      • Oracle
      • Informix
      • Sybase
      • SQL Server
    • E-mail
      • MS Exchange
      • Lotus Notes
      • Sendmail
    • In-House and Custom Applications
© 2015 CipherLink.com, Inc. all rights reserved
privacy