Home   About Us   Services   Solutions   Support            
 
Power Protection
Data
Networking
Security
 
Overview
Importance of Security
Threats to Data
Who are the Enemies?
What can the Enemies do?
Services
Assessment
Audit
Penetration Test
Security Policies
Security Tools
Wireless
E-business
 

As part of our assessment services we conduct an end-to-end analysis of your networked environment and current information assurance and security posture. We inspect your facilities and their surroundings, talk with employees, review architecture and configuration documentation, and analyze connectivity and access controls and study security policies and goals in the context of your business needs. This is a systematic baseline identification of all network devices and resources, and the establishment of evaluations for all groups of data residing on the network. Assessment turns the general description of the network into measurable sets of data that can then be used to design an effective security policy and infrastructure. You get a thorough identification of vulnerabilities and recommendation of solutions and improvements to help set priorities for investment.

 
 
© Copyright 2002 Eitech. All rights reserved.