Today, security threats are all around you. And with a new virus being detected every 6 seconds, it’s more important than ever to protect your productivity and reputation with security services from Infinity Network Solutions. Our portfolio of security services protects your computers wherever they’re connected – in the office, at home or on the road – with a solution that’s designed to fit your business. Our approach to security keeps your infrastructure safe and constantly updates your protection so you’ll never have to worry about viruses, identity thieves or web threats again.
Infinity consultants follow a proven methodology to conduct assessments that deliver optimal levels of business value. We focus on safeguarding your IT assets from a variety of threats by identifying network vulnerabilities on your systems, through a series of phases, with minimal disruption for your staff or to your productivity.
Our methodology for Security Assessments consists of several areas:
- External network topology
- Internal assessment
- Physical security assessment
- Microsoft Windows assessment
- Unix environment assessment
- Wireless security assessment
- Firewall assessment
- Weak authentication mechanisms
- Server configuration assessment for e-mail, database and DNS servers
- Web Server assessment
- SNMP checks
- Vulnerable FTP servers
Because the objective of a security assessment is to evaluate the controls over information technology that are in place, we incorporate a four-phased approached to our assessments that will identify your security goals, priorities and tolerance of risk. The four phases include: discovery, device profiling, vulnerability scanning and validation.