Network Consulting
Houston Technologies Ltd.
Delivering Technologies


 


Network Security Consulting



As companies increasingly rely on the Internet, remote access, and new, sophisticated electronic commerce applications, they are increasingly concerned with safeguarding the security of the corporate network. Protecting your business against information theft, corruption, disclosure, and denial of service is becoming more difficult as the complexity of information networks continues to grow.

 

 

We, at Houston Technologies Ltd offer a suite of security solutions to safeguard your network including:

Security Policy and Security Plan Development: We assist you in creating a security policy that reflects the unique attributes of your enterprise. We can help you develop a security plan that will enforce the security policy. A documented and supported security policy is the first step towards securing an enterprise network.

Enterprise Network Security Assessment: We evaluate the security posture of a network in the context of the current threat environment. We create a snapshot of your network architecture and identify vulnerabilities both internal and external to the network. Our Solutions works with you to formulate the security solution that best fit your specific requirements.

Enterprise Intrusion Detection: We provide custom intrusion detection technology to recognize and respond to network-based attacks. We will assist you with the selection of the optimal Intrusion Detection System (IDS) and its placement within your network. We can enhance your network operations center with a customized intrusion detection component which will provide alarms, pinpoint the location of the attack, and analyze attempted break-ins - providing you with the means to take appropriate protective actions.

Internet Security Vulnerability Assessment begins with our consultants investigating vulnerabilities of your network based on minimal information you provide, such as domain name or an email address. After researching the network, we assess system vulnerabilities using the latest technologies, including commercially available scanning tools. Additionally, we invite clients to observe as we conduct our assessment - either at our facility or on the client site with their technical staff in attendance.

Public Key Infrastructure (PKI)
is an online infrastructure using encryption, digital signatures and digital certificates to secure applications, communications and transactions. The four basic security tenets addressed by PKI are authentication, confidentiality, integrity and non-repudiation. We have the capability to offer customized PKI solutions to meet customer needs over a wide range of networks, including corporate enterprise and Internet-based models.

           
 
           
 
 
Copyright © 2000 Houston Technologies Limited. All Rights Reserved.