|
As
companies increasingly rely on the Internet, remote access, and new, sophisticated
electronic commerce applications, they are increasingly concerned with
safeguarding the security of the corporate network. Protecting your business
against information theft, corruption, disclosure, and denial of service
is becoming more difficult as the complexity of information networks continues
to grow.
|
|
 |
|
|
|
We,
at Houston Technologies Ltd offer a suite of security solutions to safeguard
your network including:
Security Policy and Security Plan Development: We assist you in
creating a security policy that reflects the unique attributes of your
enterprise. We can help you develop a security plan that will enforce
the security policy. A documented and supported security policy is the
first step towards securing an enterprise network.
Enterprise Network Security Assessment: We evaluate the security
posture of a network in the context of the current threat environment.
We create a snapshot of your network architecture and identify vulnerabilities
both internal and external to the network. Our Solutions works with you
to formulate the security solution that best fit your specific requirements.
Enterprise Intrusion Detection: We provide custom intrusion detection
technology to recognize and respond to network-based attacks. We will
assist you with the selection of the optimal Intrusion Detection System
(IDS) and its placement within your network. We can enhance your network
operations center with a customized intrusion detection component which
will provide alarms, pinpoint the location of the attack, and analyze
attempted break-ins - providing you with the means to take appropriate
protective actions.
Internet Security Vulnerability Assessment begins with our consultants
investigating vulnerabilities of your network based on minimal information
you provide, such as domain name or an email address. After researching
the network, we assess system vulnerabilities using the latest technologies,
including commercially available scanning tools. Additionally, we invite
clients to observe as we conduct our assessment - either at our facility
or on the client site with their technical staff in attendance.
Public Key Infrastructure (PKI) is an online infrastructure using
encryption, digital signatures and digital certificates to secure applications,
communications and transactions. The four basic security tenets addressed
by PKI are authentication, confidentiality, integrity and non-repudiation.
We have the capability to offer customized PKI solutions to meet customer
needs over a wide range of networks, including corporate enterprise and
Internet-based models.
|
|