Home     Our Company     The Staff      Partners     Contact Us     Request Info

 
Services Provided

Website Design 
Mission Statement

Penetration Testing
Forensics Analysis
Intrusion Detection
IT Security Auditing
Managed Security Service Provider
Training
Documents
Links
More Links

Real-Time Antivirus Alerts
Real-Time Antivirus Alerts Map

Member of Infragard




 

Our Company

Security Gauntlet Consulting -- was founded in February of 2000. Since its inception, several very exciting times have occurred for the company and the world in general. We have been taken to a new level of awareness as to the fragileness of our world. The United States has suffered great losses with the incidences of 9/11 and so has the whole world. We have gained a lot since the awakening of the new world. We have come to understand that there are "TRUE" enemies who would do anything, and as we have seen they WILL do anything to gain the slightest fame or glory (so they would think) with their actions. We as a nation have come together once again to fight off the aggression that has struck the world. 

As a provider of Information Systems Security for several year, Security Gauntlet Consulting  has strived to provide it's customers with "World Class" Information Systems Security services and products which will help our customers to fend off these same threats and situations as we move forward into a new world and new ways of doing battle. This battle is called "Cyber Warfare" and perpetrators are called "Cyber Terrorists". Corporations must come together as a "TEAM" and suppress these aggressors which seek to destroy and cripple our way of life. 

Security Gauntlet Consulting is committed to the fight on "Cyber Terrorism" and to the joining of forces to combat the aggression in today's "Connected World" of the Internet.

 

This page was last updated:  06/12/2003

Intrusion Detection, CISSP, Certified Information Systems Security Professional, hacking, cracking, script kiddies, Snort, IDS Center, PHP, security tools, policies, policy development, training, security training, information systems security, anti virus, authentication, authorization, computer security, computer virus, data privacy, data protection, desktop firewall, detection, digital certificates, FTP, SMTP, POP, SNMP, TELNET, IMAP, RAS, TCP, digital signature, vulnerability assessment, emergency response services, enterprise security, extranet, firewall, hacker, high availability firewall, rainbow books, Service Level Agreements, SLAs, high-availability firewall, IDS, information security, testing, honey pot, internet firewall, internet security systems, intrusion detection and response, intrusion protection, biometrics, network consulting, scans, network protection, network security, Change Management, Controls, Auditing, NID, HID, Network Intrusion Detection, Host Intrusion Detection, network intrusion, host intrusion, network-based, host-based, network intrusion detection, host intrusion detection, network-based intrusion detection, host-based intrusion detection, secure log, secure logging, logging, public key infrastructure, rapid response, risk management, risk solutions, security services, security technology, security training, SSL, system administration, unauthorized access, virtual private networks, virus protection, virus scanning, VLAN, VPN security,