Call Now: (800) 713-7670                                  (281) 456-2474IT Network Security & Penetration    Testing In Ho...
IT Network Security & Penetration Testing» Safeguarding customers’ confidential information is important to any  business,...
» McCann Investigations offers a comprehensive suite of services that  guarantees your organization an improved network se...
» To ensure that your security efforts maintain a positive direction, we  also offer security awareness training so that y...
» At McCann Investigations, we make a detailed, comprehensive evaluation of your IT security and network security while id...
» Once complete, you’ll receive a written report that identifies all  vulnerabilities in your network security and offers ...
IT Security Assessments» Timely identification and remediation of network vulnerabilities is  something every organization...
» Our experts test for network security weaknesses while providing  suggestions for improvement. Testing allows client man...
1 Internal Network Security Breach Assessments: IVA1  • The Internal Network Security Breach Assessment can be performed  ...
2 External Network Security Breach Assessments: EVA2  • Vulnerabilities that may exist between a customer’s external netwo...
3 Wireless Network Security Assessment: WNA3  • Wireless technologies do not have the physical access restrictions   used ...
» Discovery of all wireless access points and clients–MGI performs a site survey  to discover all existing wireless access...
Penetration Testing» Penetration testing is a method of probing and identifying security vulnerabilities in your network a...
» Vulnerability management and penetration testing work hand in hand to close any potential openings available to corporat...
» Each penetration test includes a detailed report of any identified vulnerability, classified by the likelihood it could ...
Social Engineering Testing» The human element of your company’s security may be tested, along with  your fixed information...
1 External Social Engineering1  • MGI will perform Social Engineering phone calls to individuals   within the organization...
2 Targeted Email “Phishing” Attacks2  Emails will be sent to individuals and groups within the organization  in order to a...
3 Malicious Portable Media3  • USB Flash drives and CD-ROM drives with enticing labels such as   “Salary” will be left in ...
4 Sensitive Document Disposal Audit4  “Dumpster Diving” – MGI will search internal trash receptacles and  external dumpste...
Facebook     TwitterOffices: Houston | Dallas | Austin | San Antonio | New York      Headquarters: 5205 Spruce, Houston, T...
Upcoming SlideShare
Loading in …5
×

IT Network Security & Penetration Testing In Houston, Dallas, Austin, San Antonio, Texas and New York

456
-1

Published on

Computer forensics, digital debugging, network breaches, Data Acquisition And Imaging as well as traditional private investigation services in Houston, Dallas, Austin, San Antonio, Texas and New York at mccanninvestigations.com. McCann Investigations offers a comprehensive suite of services that guarantees your organization an improved network security and IT security environment. Starting with the assessment phase, we will help you identify vulnerabilities in your network and provide you with an action plan to address them.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
456
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

IT Network Security & Penetration Testing In Houston, Dallas, Austin, San Antonio, Texas and New York

  1. 1. Call Now: (800) 713-7670 (281) 456-2474IT Network Security & Penetration Testing In Houston, Texas mccanninvestigations.com
  2. 2. IT Network Security & Penetration Testing» Safeguarding customers’ confidential information is important to any business, but it is especially important for companies that collect and store non-public customer financial information.» As regulations and compliance issues regarding your organization’s information and security systems become more complex, uncovering and addressing IT security issues before an incident occurs can be vital. mccanninvestigations.com
  3. 3. » McCann Investigations offers a comprehensive suite of services that guarantees your organization an improved network security and IT security environment.» Starting with the assessment phase, we will help you identify vulnerabilities in your network and provide you with an action plan to address them. Once the assessment phase is complete, we can help validate your remediation efforts by performing external and internal penetration testing. mccanninvestigations.com
  4. 4. » To ensure that your security efforts maintain a positive direction, we also offer security awareness training so that your users can do their part to ensure the security of your information assets.» All of McCann Investigations services can be utilized to aid in your regulatory compliance with: • The Sarbanes-Oxl Act, Section 404 • Payment Card Industry Data Security Standard (PCI DSS) • The Gramm-Leach Bililey Act (GLBA) • The Health Insurance Portability and Accountability Act (HIPAA) mccanninvestigations.com
  5. 5. » At McCann Investigations, we make a detailed, comprehensive evaluation of your IT security and network security while identifying issues requiring your attention and suggesting solutions so you can take positive action.» We’ll show you how implementing these solutions can help ensure the confidentiality, integrity, and availability of your information assets and ensure peace of mind for your employees, management, and board of directors. We provide a wide range of services, including. • Comprehensive Security Assessments • Internal and External Network Breach Assessments • Social Engineering Testing • Internal Controls Assessments • Policy Review • Risk Assessment Facilitation • Security Awareness Training • Business Continuity and Disaster Recovery Planning mccanninvestigations.com
  6. 6. » Once complete, you’ll receive a written report that identifies all vulnerabilities in your network security and offers practical solutions that can be implemented within your organization.» We’ll also help you prioritize those solutions, giving you a step-by-step process through which you can reach your IT security goals. Other benefits include: • Assessments that touch all aspects of your operation, incorporating physical, administrative, and technical components of your IT security processes. • Utilization of up-to-date vulnerability databases • Experience in a wide range of clients and industries Let the professionals at McCann Investigations help you resolve the issues that can affect your IT security systems and processes. mccanninvestigations.com
  7. 7. IT Security Assessments» Timely identification and remediation of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses.» The process of identifying vulnerabilities, evaluating the risk, remediation, and reporting for IT security is called vulnerability management.» By using a formal vulnerability management process, organizations are able to more efficiently find and fix security vulnerabilities within their network, improving network security. mccanninvestigations.com
  8. 8. » Our experts test for network security weaknesses while providing suggestions for improvement. Testing allows client management to be confident knowing what vulnerabilities may exist and provide the opportunity to develop a plan to address any issues.» Certified security professionals are proficient in network security techniques and system exploits with knowledge on multiple network platforms.» You receive written descriptions of each vulnerability identified with specific backgrounds, consequences, and remediation instructions. These are further analyzed and reported with prioritization and understandable suggestions. mccanninvestigations.com
  9. 9. 1 Internal Network Security Breach Assessments: IVA1 • The Internal Network Security Breach Assessment can be performed in conjunction with the External Test and includes an in-depth analysis of the customer’s internal network security. • It is estimated that approximately 80% of security breaches occur from inside the internal network. This Network Security Breach Assessment will analyze the risks to internal devices and suggest specific hardening techniques to resolve any concerns that are identified. mccanninvestigations.com
  10. 10. 2 External Network Security Breach Assessments: EVA2 • Vulnerabilities that may exist between a customer’s external network and the Internet. • This service simulates various electronic attack methods that could be launched against an Internet access point. mccanninvestigations.com
  11. 11. 3 Wireless Network Security Assessment: WNA3 • Wireless technologies do not have the physical access restrictions used in traditional wired environments. They make it possible for someone in the lobby, the parking lot, or across the street to have access to a network carrying sensitive financial or corporate data, personnel or customer information, competitive data, or trade secrets. • Our assessment will help you to identify insecure wireless implementations that put your organization at risk. MGI utilizes wireless equipment and tools to locate and assess wireless networks and rogue access points. • We will review policies and procedures, architecture, configuration, and monitoring procedures for alignment with industry best practices. mccanninvestigations.com
  12. 12. » Discovery of all wireless access points and clients–MGI performs a site survey to discover all existing wireless access points and clients. MGI will also note any external wireless network whose signal range enters your premises. Optionally, MGI can map all access points to a floor plan, if available.» Validation of wireless network perimeter–One of the reasons wireless security is so complex is wireless networks are not limited to the physical boundaries of your buildings. Using directional antennas, MGI maps the actual perimeter of your network that is vulnerable to war drivers. We also provide advice on how to limit unnecessary exposure to the outside world.» Vulnerability and penetration testing of access points– Using a variety of tools, MGI will sniff and capture ongoing wireless traffic and attempt to compromise the utilized encryption and break into wireless access points and clients.» Configuration review of access points and wireless clients– MGI will review the configuration of wireless devices. We validate the configuration by comparing it against a random sampling of access points and clients to check that deployments are consistent with these guidelines. mccanninvestigations.com
  13. 13. Penetration Testing» Penetration testing is a method of probing and identifying security vulnerabilities in your network and the extent to which they could be exploited by a hacker.» These tests are typically performed using automated tools that look for specific weaknesses, technical flaws, or vulnerabilities to exploit.» The results are presented to the system owner with an assessment of their risk to the networked environment and a remediation plan highlighting the steps needed to eliminate the exposures. mccanninvestigations.com
  14. 14. » Vulnerability management and penetration testing work hand in hand to close any potential openings available to corporate attackers.» Together, vulnerability management and penetration testing enhance security and lessen the probability that the criminals could penetrate your systems.» We perform these tests using an evolving process that includes cutting-edge tools, mimicking the activity of a determined hacker. Instead of a “canned” approach to testing, we tailor our procedures according to your specific needs and concerns, helping to increase the cost-effectiveness of this service.» The depth of the penetration testing can be established at your discretion – from basic attempts of unauthorized access and web-site defacement to full-scale denial-of-service. mccanninvestigations.com
  15. 15. » Each penetration test includes a detailed report of any identified vulnerability, classified by the likelihood it could be exploited and by the impact that it might have on the company’s network.» The data from these periodic Network Breach Assessments and/or penetration tests could be compiled throughout the year and presented in consolidated format in an annual report.» Please note that the Network Breach Assessment is more thorough than the Penetration Test, as it considers a wide array of internal components.» It may be advantageous to perform Penetration Testing subsequent to addressing issues identified during a Network Breach Assessment. mccanninvestigations.com
  16. 16. Social Engineering Testing» The human element of your company’s security may be tested, along with your fixed information systems. These tests are tailored to your objectives and highly customized to fit your situation.» The weakest link in any security program is an organization’s people; attackers take advantage of this weakness through social engineering. Social engineering is a term that describes the non-technical intrusion into an organization that relies on human interaction, often involving tricking people in order to break normal security policies.» Similar to traditional “con games” where one person is duped because they are naturally trusting, attackers will use any technique to gain unauthorized information.» Social engineering techniques include everything from phone calls with urgent requests to people with administrative privileges to Trojans lurking behind email messages that attempt to lure the user into opening the attachments. MGI will attempt to by-pass the people who enforce your security through a variety of means, such as the following: mccanninvestigations.com
  17. 17. 1 External Social Engineering1 • MGI will perform Social Engineering phone calls to individuals within the organization. Targets will include individuals from the help desk, IT department, human resources, finance, and other departments within the organization. • The objective of these calls will be to induce the users to divulge sensitive information over the phone in violation of company policy. mccanninvestigations.com
  18. 18. 2 Targeted Email “Phishing” Attacks2 Emails will be sent to individuals and groups within the organization in order to attempt to entice the user to click on an external link that will either attempt to gather sensitive information or deliver a malicious payload onto their desktop system which could include browser and operating system buffer overflows, Trojan horses, and keystroke loggers. Targeted Email mccanninvestigations.com
  19. 19. 3 Malicious Portable Media3 • USB Flash drives and CD-ROM drives with enticing labels such as “Salary” will be left in public areas such as hallways, restrooms, and break rooms. • The media will contain simulated malicious code that will attempt to grab sensitive host information such as the network configuration, list of running processes, and a password hash dump. mccanninvestigations.com
  20. 20. 4 Sensitive Document Disposal Audit4 “Dumpster Diving” – MGI will search internal trash receptacles and external dumpster and disposal areas for sensitive documents or storage media that is disposed of in violation of company policy. mccanninvestigations.com
  21. 21. Facebook TwitterOffices: Houston | Dallas | Austin | San Antonio | New York Headquarters: 5205 Spruce, Houston, TX 77401 Call Now (800) 713-7670 or (281) 456-2474 mccanninvestigations.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×