user_mobilelogo

True Security Expert

Michael is always available to discuss our network security needs and immerses himself in the details. If we ever had a a question or issue he personally involved himself in the resolution. Michael is also very willing to help educate and provide critical knowledge transfer to ensure that his clients had a clear understanding of the services he provided and the technology behind it. A true security expert.

James Voros, Vice President of IT, Greenwich AssociatesGreenwich Associates

Detail Oriented Security Expert

Michael is a detail oriented security expert who has conceptualized future looking security changes and has addressed them through software and product develop. I have used Michael in several projects across multiple organizations and entrusted all my real time email and penetration testing to he and his products.

James Sampel, Managing Director Global Operations and Chief Information Officer at Greenwich AssociatesGreenwich Associates

An external penetration test can be used to find external vulnerabilities in your network.  We wrote many of the programs and tests currently in use by both commercial and open source pen test tools.

We can offer one time, or monthly penetration testing, or offer it as part of a larger IT Audit or Risk Assessment.

 

External penetration testing is an integral part of an overall network vulnerability assessment, and will include

Automated scans with tests for:

  • Open ports and inappropriate services
  • Operating system vulnerabilities
  • Known web server vulnerabilities

Manual probes, which may include:

  • Verification of vulnerabilities detected
  • Use of white hat tools

This scanning incorporates tests that address more than 50,000 known vulnerabilities and weaknesses.  Tests will be configured to run in a non-destructive manner in order to prevent disruption of critical services.