Security Assessment
Assessing your technical, physical and administrative security controls
is part of maintaining a proactive security posture. Integsys
performs assessments including system audits, code reviews, network
scans, and penetration testing.
Vulnerability Scanning
Our security professionals conduct on-site internal and external
vulnerability scans of your network and systems and work with your IT
staff to chart out a course to a more secure future. We have built our
services around industry-proven scanning software maned by certified
security professionals. Our security professionals work with you to
produce a report that complies with industry standards while addressing
your unique security needs.
System Security Testing
System configuration and management weaknesses are historically the
primary cause of security breaches. System hardening and management
procedures can reduce the risk to an organization. Integsys
has extensive experience in system security testing in any network
environment. Our testing procedures will identify weaknesses in any
system including mainframe OS/390, AS400, Unix/Linux/BSD/Solaris,
Windows, databases, VoIP/telecomm, printers, Network Attached Storage
(NAS), and network appliances.
Wireless Security Assessment
Wireless networking technology is one the greatest security challenges
facing your IT department even if you don't officially permit it.
Wireless and cellular wireless technologies are readily available and
easy to set up, it represents a potential security hole you must
address. Integsys' FCC licensed personal can scan the
air waves for hidden security risks.
Social Engineering
Integsys can help you with the “people” aspect of
IT security. Regardless of the policies you implement and the physical
barriers you erect, the strength of your security comes down to the
training, awareness, and vigilance of your people. Security policies
and security awareness training are fundamental parts of an effective
security program and mandated by Sarbanes Oxley Section 404. Integrated
Systems can customize testing programs to your needs; many of our
security professionals have formal university teaching experience.
Application Code Review
Application code vulnerabilities and design flaws are the battleground
of information security. Integsys can help your development
teams make certain that applications are secure. This includes ensuring
that they are designed based on analysis of risks, threats, and
exposures, and tested to meet security requirements. Integsys
audits your application source code to identify vulnerabilities and can
help your organization implement security conscious coding
methodologies. An Integsys code review provides detailed
documentation that includes guidance for resolution of code
vulnerabilities. Software development requires that independent code
review be incorporated into your security development life-cycle.
Application Penetration Testing
Applications are the most critical interface to your sensitive
information assets. Your security risk is critically linked to the
security of your applications. Network and application vulnerability
assessment and scanning can provide a base level of security to your
applications. Threat agents and attack vectors incorporate layers of
attacks that leverage innocuous information to expose operational
vulnerabilities in an application.
Network Penetration Testing
Network Penetration Testing or "pen testing" provides valuable
information about the risk profile of your network. Automated scanning
generally stops at identifying the vulnerability signature and often
does not validate the path a real exploit may attempt. Network
penetration testing allows you a complete picture of the risk exposure
that a vulnerability could produce. Annual or quarterly network
penetration testing can complement regular vulnerability scanning and
provides a real world validation of configuration and vulnerability
management. In short pen testing simulates a real hacker.
|
|