|
|
|
INTELIZATION implements a layered approach to security. Layered security provides the best
protection for the Network as well as the Applications on the servers. While other companies
want to implement an off the shelf solution to fit all needs, our INTELIZATION and the use
of Layers provides a customized solution, for Maximum portection.Today's internet servers need
better protection to survive the scanning, probing and automated attacks which are occur all
over the world. Now, improved, automatic Network Security for your network and servers has never
been easier.While firewalls are good devices for permanently blocking IP Addresses, not unwanted
content, they are either static or stateful, not dynamic by design. Inherently the firewall
permits access to the outside for some.
|
|
INTELIZATION offers following Network Security services :
|
|
Penetration Testing
A realistic assessment of security--creative by design and policy is absolutely invaluable. We have found
vulnerabilities and security holes in everything from a Web Server to a Internet Instant Messenger or be it
a Point of Sale Payment Terminal. We provide the most realistic and useful security analysis anywhere in
any network system.
|
|
Network Testing
Our team tests everything from a single computer, servers and firewall to an entire enterprise.
|
|
Server Testing
When a new server is deployed, whether in-house or in a data center, can result in significant security risks.
We provide hard evidence of the risks, and then find a solution which doesn't reduce functionality and provides your
the best working security model without compromising over functionality.
|
|
Application Review
Many security lapses and vulnerabilities are caused by poorly written software applications. We can analyze source
code to find inherent errors. If source is not available, we can attack the application as an outsider, and suggest
alternative solutions to ensure the applications meets the security criteria.
|
|
|
|
INTELIZATION’s Vulnerability Assessment is an outsourced service that assesses your network and systems for exposure
to potential security weaknesses. The assessment is carried out by INTELIZATION’s security team, with help where necessary
from our partners. Any identified weaknesses are reported to the client, along with recommendations for corrective actions.
Penetration testing or ethical hacking, an advanced vulnerability scanning service, also forms part of this offering.
The service is designed to prevent attempts to hack into corporate networks and gain access to sensitive business resources.
The Vulnerability Assessment can be carried out remotely or on site and does not require any resource involvement from the client.
|
|
The Vulnerability Assessment Includes :
|
|
Physical
Review of electrical, mechanical, and structural elements of the facility
|
|
Logical
Review of business and IT disciplines that are used to manage the business
|
|
Security
Review of logical security of your data and information, as well as the physical security of the site
|
|
Workplace Safety
Review of personnel protection considerations such as mail room package handling, termination and hiring
policies and procedures, emergency supplies, training, and trauma management
|
|
|
|
A penetration test determines how well your organization's security policies protect your assets by trying
to gain access to your network and information assets in the same way a hacker would. Tests can range from
an overview of the security environment to attempted "hacking" with the intent of obtaining investigative
information. The INTELIZATION's penetration test will reveal:
1. How difficult it is to obtain data from outside of the network
2. What measures should be implemented to protect your assets
3. Which information is at risk
|
|
The Penetration Testing Process Includes :
|
|
Discovery through Footprinting
Our team will perform thorough searches of the various databases, scan tools, etc, to obtain
as much information as possible about the target organization. These searches often reveal many
more Internet connections than the organizations expect. It is also important to leverage Usenet
postings and Social Engineering tactics , many organizations are amazed by how willing their
employees are to divulge information that is useful to an attacker.
|
|
Enumeration
Once we identify the domain names, networks and systems through discovery, the penetration tester will
gain as much information as possible about each one. The key difference between discovery and enumeration
is the level of intrusiveness. Enumeration involves actively trying to obtain user names, network share
information and application version information of running services.
|
|
Vulnerability Mapping
Vulnerability mapping, one of the most important phases of penetration testing, occurs when security practitioners
map the profile of the environment to publicly known, or, in some cases, unknown vulnerabilities. We have a dedicated
department, which is constantly combing the “blackhat” community for new and emerging vulnerabilities. The tester's
work is performed during the discovery and enumeration phases.
|
|
Exploitation
The exploitation phase begins once the target system's vulnerabilities are mapped. The penetration tester will attempt
to gain privileged access to a target system by exploiting the identified vulnerabilities. The key to this phase is
manual testing. No automated tool can take place of the testing of an experienced penetration tester who is skilled in this art.
|
|
Reporting
INTELIZATION works with you to develop a report that will provide clear findings and a prioritized matrix of actions & work efforts.
Our tem will provide a preliminary draft report to the technical point of contact for the purposes of review and clarification followed
by another report at the conclusion of testing. The report will include:
1. Executive Summary (jargon free, true executive level summary)
2. Methodologies and scope, and summary of evaluations
3. Research: IRC, USENET, Websites, etc
4. Priority Matrix, indicating remediation priorities, and risk
5. Work Matrix, indicating estimates of work efforts required for remediation
6. Findings and recommendations sufficient for risk management and remediation planning
|
|
|
|
INTELIZATION’s Computer Forensics and Cybercime Team has hands on experience, as well as teaching experience at the college level in:
Computer Security, Computer Forensics, and Forensic Science and Investigations.
Our services encompass the electronic discovery process, media restoration and recovery, forensic imaging, domestic data capture,
data analysis, expert testimony, and risk management.
|
|
Our Cyber Crime Investigation Service Includes :
|
1. Computer / Internet Abuse Investigations
2. Computer Forensic Services
3. Ecommerce Investigations
4. Computer / Network Sabotage Investigations
5. Data Recovery
|