Home     Our Company     The Staff      Partners     Contact Us     Request Info


Services Provided

Website Design 
Mission Statement

Penetration Testing
Forensics Analysis
Intrusion Detection
IT Security Auditing
Managed Security Service Provider
Training
Documents
Links
More Links

Real-Time Antivirus Alerts
Real-Time Antivirus Alerts Map

 

Member of Infragard




 

IT Security Auditing

Security Gauntlet Consulting provides Information Systems audits to include Healthcare and Financial applications and associated support systems for compliance of corporate security standards, "Best Practices" for security and the HIPAA and Gramm-Leach-Bliley Act (GLB Act) initiatives. 

We provide customers with a detailed analysis on the application, it's security controls, implementation recommendations as they pertain to cost effective security measures and Risk Mitigation measures which should be taken to comply with these new Federal Regulations. 

Security Gauntlet Consulting also provides Internal and External Auditing of Internet facing Information Technology from many aspects. These audits are performed using Risk Assessment and Risk Mitigation methodologies. We perform detailed penetration testing, vulnerability assessments, detailed implementation assessments and deliver detailed reports which contain Risk Mitigation recommendations.

For more information on IT Security Auditing please Email us at Audit@SecurityGauntlet.com.

Intrusion Detection, CISSP, Certified Information Systems Security Professional, hacking, cracking, script kiddies, Snort, IDS Center, PHP, security tools, policies, policy development, training, security training, information systems security, anti virus, authentication, authorization, computer security, computer virus, data privacy, data protection, desktop firewall, detection, digital certificates, FTP, SMTP, POP, SNMP, TELNET, IMAP, RAS, TCP, digital signature, vulnerability assessment, emergency response services, enterprise security, extranet, firewall, hacker, high availability firewall, rainbow books, Service Level Agreements, SLAs, high-availability firewall, IDS, information security, testing, honey pot, internet firewall, internet security systems, intrusion detection and response, intrusion protection, biometrics, network consulting, scans, network protection, network security, Change Management, Controls, Auditing, NID, HID, Network Intrusion Detection, Host Intrusion Detection, network intrusion, host intrusion, network-based, host-based, network intrusion detection, host intrusion detection, network-based intrusion detection, host-based intrusion detection, secure log, secure logging, logging, public key infrastructure, rapid response, risk management, risk solutions, security services, security technology, security training, SSL, system administration, unauthorized access, virtual private networks, virus protection, virus scanning, VLAN, VPN security,