user_mobilelogo

True Security Expert

Michael is always available to discuss our network security needs and immerses himself in the details. If we ever had a a question or issue he personally involved himself in the resolution. Michael is also very willing to help educate and provide critical knowledge transfer to ensure that his clients had a clear understanding of the services he provided and the technology behind it. A true security expert.

James Voros, Vice President of IT, Greenwich AssociatesGreenwich Associates

Consummate InfoSec Professional

Michael Scheidell is a great example of a consummate information security professional. Michael contributed a great deal to the successful implementation of our Information Security Program at Banco Internacional De Costa Rica when I was the V.P. of IT at that institution. Michael understands the importance of identifying the risk inherent on a network infrastructure, but more importantly, he is able to design and implement solutions that would minimize those risks to an acceptable level.

Ray Guzman, Former VP of IT

An external penetration test can be used to find external vulnerabilities in your network.  We wrote many of the programs and tests currently in use by both commercial and open source pen test tools.

We can offer one time, or monthly penetration testing, or offer it as part of a larger IT Audit or Risk Assessment.

 

External penetration testing is an integral part of an overall network vulnerability assessment, and will include

Automated scans with tests for:

  • Open ports and inappropriate services
  • Operating system vulnerabilities
  • Known web server vulnerabilities

Manual probes, which may include:

  • Verification of vulnerabilities detected
  • Use of white hat tools

This scanning incorporates tests that address more than 50,000 known vulnerabilities and weaknesses.  Tests will be configured to run in a non-destructive manner in order to prevent disruption of critical services.