1 / 1

PENETRATION TESTING

Airmagnet. Huntsville Radio Service, Inc. since the early 40’s, and now our new division, BizComm , understands the need for secure communications and is ready to assist you with secure compliance issues of your industry. COMPLIANCE STANDARDS

katima
Download Presentation

PENETRATION TESTING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Airmagnet Huntsville Radio Service, Inc. since the early 40’s, and now our new division, BizComm, understands the need for secure communications and is ready to assist you with secure compliance issues of your industry. COMPLIANCE STANDARDS Having a strong understanding of compliance standards such as, HIPAA, DOD 8100.2, SOX, and PCI DSS, we are able to analyze your business to help assure that you are compliant. We provide full system audits and provide reports to help you to understand your weak points in compliance. RISK ASSESSMENT Our risk assessment system will analyze every aspect of your business, from physical, to the cyber realm and provide you information, and recommendations, on how to better handle, or mitigate your risks. PENETRATION TESTING We provide three types of penetration testing. White box Penetration Testing is where we come to your company and test the security from many different levels to ensure that your company is well protected from rogue, or disgruntled employees. Grey box Penetrationis where you provide specific information to us, and we will attempt to gain access to your company, with many different techniques. Black box Penetration is where we will be provided no information more than a company name, and attempt to work as if we were a random hacker attempting to gain information, or access your company assets. COMPUTER FORENSICS Lost your data, or need to investigate an employee? We work to help recover any data that may have been lost, or stolen. We also have the ability to help investigate any employee’s that may be stealing information, or not following proper policies. • Problems Solved: • Security Concerns • Compliance to regulations • Determent of Hackers • Performance Issues • Management of access • Identification of rogue devices, or employees • Minimized data loss • Services Offered: • Compliance audits • Risk assessments • Penetration Testing • Secure code reviews • Computer Forensics • REFERENCES AVAILABLE

More Related