Home     Our Company     The Staff      Partners     Contact Us     Request Info

 
Services Provided

Website Design
Mission Statement

Penetration Testing
Forensics Analysis
Intrusion Detection
IT Security Auditing
Managed Security Service Provider
Training
Documents
Links
More Links

Real-Time Antivirus Alerts
Real-Time Antivirus Alerts Map

Member of Infragard




Forensics Analysis

When you find yourself having to investigate a Breach or Possible Intrusion on a network or computer system STOP, DO NOT Touch Anything.

CALL Security Gauntlet Consulting FIRST.

This simple phone call could save you literally Millions of $$$$. CALL 203-217-5004

The first RULE of a forensics investigation is to insure the "Chain of Custody". If you look, scan or access a computer which could have possibly been compromised you just reduced you possibility of legal actions by an enormous amount.

Security Gauntlet Consulting provides it's clients with a wide variety of Computer related Forensics Analysis with state-of-the-art techniques and tools. We provide a complete analysis of the system or systems. We can provide assistance to Information Security Professionals on an item-by-item basis to enhance their ability to provide their organization with legally binding and complete information. We also provide "Expert" and "Certified Professional" testimony during court cases. 

Please Contact us for Immediate Analysis
Forensics@SecurityGauntlet.com

 

Intrusion Detection, CISSP, Certified Information Systems Security Professional, hacking, cracking, script kiddies, Snort, IDS Center, PHP, security tools, policies, policy development, training, security training, information systems security, anti virus, authentication, authorization, computer security, computer virus, data privacy, data protection, desktop firewall, detection, digital certificates, FTP, SMTP, POP, SNMP, TELNET, IMAP, RAS, TCP, digital signature, vulnerability assessment, emergency response services, enterprise security, extranet, firewall, hacker, high availability firewall, rainbow books, Service Level Agreements, SLAs, high-availability firewall, IDS, information security, testing, honey pot, internet firewall, internet security systems, intrusion detection and response, intrusion protection, biometrics, network consulting, scans, network protection, network security, Change Management, Controls, Auditing, NID, HID, Network Intrusion Detection, Host Intrusion Detection, network intrusion, host intrusion, network-based, host-based, network intrusion detection, host intrusion detection, network-based intrusion detection, host-based intrusion detection, secure log, secure logging, logging, public key infrastructure, rapid response, risk management, risk solutions, security services, security technology, security training, SSL, system administration, unauthorized access, virtual private networks, virus protection, virus scanning, VLAN, VPN security,