Home Services Education Clients Feedback Contact Us

INTELIZATION implements a layered approach to security. Layered security provides the best protection for the Network as well as the Applications on the servers. While other companies want to implement an off the shelf solution to fit all needs, our INTELIZATION and the use of Layers provides a customized solution, for Maximum portection.Today's internet servers need better protection to survive the scanning, probing and automated attacks which are occur all over the world. Now, improved, automatic Network Security for your network and servers has never been easier.While firewalls are good devices for permanently blocking IP Addresses, not unwanted content, they are either static or stateful, not dynamic by design. Inherently the firewall permits access to the outside for some.

INTELIZATION offers following Network Security services :

Penetration Testing
A realistic assessment of security--creative by design and policy is absolutely invaluable. We have found vulnerabilities and security holes in everything from a Web Server to a Internet Instant Messenger or be it a Point of Sale Payment Terminal. We provide the most realistic and useful security analysis anywhere in any network system.

Network Testing
Our team tests everything from a single computer, servers and firewall to an entire enterprise.

Server Testing
When a new server is deployed, whether in-house or in a data center, can result in significant security risks. We provide hard evidence of the risks, and then find a solution which doesn't reduce functionality and provides your the best working security model without compromising over functionality.

Application Review
Many security lapses and vulnerabilities are caused by poorly written software applications. We can analyze source code to find inherent errors. If source is not available, we can attack the application as an outsider, and suggest alternative solutions to ensure the applications meets the security criteria.

INTELIZATION’s Vulnerability Assessment is an outsourced service that assesses your network and systems for exposure to potential security weaknesses. The assessment is carried out by INTELIZATION’s security team, with help where necessary from our partners. Any identified weaknesses are reported to the client, along with recommendations for corrective actions. Penetration testing or ethical hacking, an advanced vulnerability scanning service, also forms part of this offering. The service is designed to prevent attempts to hack into corporate networks and gain access to sensitive business resources. The Vulnerability Assessment can be carried out remotely or on site and does not require any resource involvement from the client.

The Vulnerability Assessment Includes :

Physical
Review of electrical, mechanical, and structural elements of the facility

Logical
Review of business and IT disciplines that are used to manage the business

Security
Review of logical security of your data and information, as well as the physical security of the site

Workplace Safety
Review of personnel protection considerations such as mail room package handling, termination and hiring policies and procedures, emergency supplies, training, and trauma management

A penetration test determines how well your organization's security policies protect your assets by trying to gain access to your network and information assets in the same way a hacker would. Tests can range from an overview of the security environment to attempted "hacking" with the intent of obtaining investigative information. The INTELIZATION's penetration test will reveal:

1. How difficult it is to obtain data from outside of the network
2. What measures should be implemented to protect your assets
3. Which information is at risk

The Penetration Testing Process Includes :

Discovery through Footprinting
Our team will perform thorough searches of the various databases, scan tools, etc, to obtain as much information as possible about the target organization. These searches often reveal many more Internet connections than the organizations expect. It is also important to leverage Usenet postings and Social Engineering tactics , many organizations are amazed by how willing their employees are to divulge information that is useful to an attacker.

Enumeration
Once we identify the domain names, networks and systems through discovery, the penetration tester will gain as much information as possible about each one. The key difference between discovery and enumeration is the level of intrusiveness. Enumeration involves actively trying to obtain user names, network share information and application version information of running services.

Vulnerability Mapping
Vulnerability mapping, one of the most important phases of penetration testing, occurs when security practitioners map the profile of the environment to publicly known, or, in some cases, unknown vulnerabilities. We have a dedicated department, which is constantly combing the “blackhat” community for new and emerging vulnerabilities. The tester's work is performed during the discovery and enumeration phases.

Exploitation
The exploitation phase begins once the target system's vulnerabilities are mapped. The penetration tester will attempt to gain privileged access to a target system by exploiting the identified vulnerabilities. The key to this phase is manual testing. No automated tool can take place of the testing of an experienced penetration tester who is skilled in this art.

Reporting
INTELIZATION works with you to develop a report that will provide clear findings and a prioritized matrix of actions & work efforts. Our tem will provide a preliminary draft report to the technical point of contact for the purposes of review and clarification followed by another report at the conclusion of testing. The report will include:

1. Executive Summary (jargon free, true executive level summary)
2. Methodologies and scope, and summary of evaluations
3. Research: IRC, USENET, Websites, etc
4. Priority Matrix, indicating remediation priorities, and risk
5. Work Matrix, indicating estimates of work efforts required for remediation
6. Findings and recommendations sufficient for risk management and remediation planning

INTELIZATION’s Computer Forensics and Cybercime Team has hands on experience, as well as teaching experience at the college level in: Computer Security, Computer Forensics, and Forensic Science and Investigations.

Our services encompass the electronic discovery process, media restoration and recovery, forensic imaging, domestic data capture, data analysis, expert testimony, and risk management.

Our Cyber Crime Investigation Service Includes :
1. Computer / Internet Abuse Investigations
2. Computer Forensic Services
3. Ecommerce Investigations
4. Computer / Network Sabotage Investigations
5. Data Recovery
2009 INTELIZATION. All rights reserved