Home     Our Company     The Staff      Partners     Contact Us     Request Info

 
Services Provided

Website Design 
Mission Statement

Penetration Testing
Forensics Analysis
Intrusion Detection
IT Security Auditing
Managed Security Service Provider
Training
Documents
Links
More Links

Real-Time Antivirus Alerts
Real-Time Antivirus Alerts Map

Member of Infragard




 

ARE YOU VULNERABLE? 

TAKE THE TEST

If you answer ANY of these questions with a NO, then you should have a Penetration Test done as soon as possible:

                                    Important Security Questions

NO

YES

Do you have a Hardware-based Firewall between you network and the Internet?

 

 

Is your Firewall performing Network Address Translation?

 

 

Is the internal network addressing utilizing a “Private” IP scheme

 

 

Is your Firewall “Stateful”?

 

 

Does your Firewall have logging enabled?

 

 

Do you have the ability and professional expertise to perform Log Analysis on the Firewall logs?

 

 

Is your Firewall monitor 24x7x365?

 

 

Do you have a Network-Based Intrusion Detection System (IDS) monitoring you Internet and Corporate LAN/WAN traffic?

 

 

Is your IDS monitored 24x7x365?

 

 

Do you have the ability and professional expertise to perform analysis on the IDS data?

 

 

Does your Internet router have an Access Control List, which is controlling Inbound and Outbound Internet access?

 

 

Is your Internet router monitored 24x7x365?

 

 

Do you have real-time and live Updating and Patching of your Operating Systems and Application?

 

 

Do you use Modems for dial-up access to the Internet or other Corporate internal sites?

 

 

Do you have LOTS of money to freely give away to a “Cracker” or “Script Kiddy”?  

 

 

If you answered NO to this question then CALL NOW to have a Detailed Penetration Test performed by Internationally Certified Information Security Professionals at:  Security Gauntlet Consulting
Intrusion Detection, CISSP, Certified Information Systems Security Professional, hacking, cracking, script kiddies, Snort, IDS Center, PHP, security tools, policies, policy development, training, security training, information systems security, anti virus, authentication, authorization, computer security, computer virus, data privacy, data protection, desktop firewall, detection, digital certificates, FTP, SMTP, POP, SNMP, TELNET, IMAP, RAS, TCP, digital signature, vulnerability assessment, emergency response services, enterprise security, extranet, firewall, hacker, high availability firewall, rainbow books, Service Level Agreements, SLAs, high-availability firewall, IDS, information security, testing, honey pot, internet firewall, internet security systems, intrusion detection and response, intrusion protection, biometrics, network consulting, scans, network protection, network security, Change Management, Controls, Auditing, NID, HID, Network Intrusion Detection, Host Intrusion Detection, network intrusion, host intrusion, network-based, host-based, network intrusion detection, host intrusion detection, network-based intrusion detection, host-based intrusion detection, secure log, secure logging, logging, public key infrastructure, rapid response, risk management, risk solutions, security services, security technology, security training, SSL, system administration, unauthorized access, virtual private networks, virus protection, virus scanning, VLAN, VPN security,