user_mobilelogo

True Security Expert

Michael is always available to discuss our network security needs and immerses himself in the details. If we ever had a a question or issue he personally involved himself in the resolution. Michael is also very willing to help educate and provide critical knowledge transfer to ensure that his clients had a clear understanding of the services he provided and the technology behind it. A true security expert.

James Voros, Vice President of IT, Greenwich AssociatesGreenwich Associates

Security Leader

I have recruited Data Security leaders since the early 80’s. Mike Scheidell is at the top of his profession. There is no challenge too big or too complicate for this industry guru. He has provided my organization with state of the art protection and I have never heard from him or his team “we can't do that”. An old story comes to mind, in the early 80’s I asked Mike if he knew how to provide my company a simple solution to a very complicated issue we had that appeared to be over the top. His answer was “no…, but I can figure it out”. And he did.

Steve Mersand, CEO Jon Harvey Associates, Incon Harvey Associates, Inc

An external penetration test can be used to find external vulnerabilities in your network.  We wrote many of the programs and tests currently in use by both commercial and open source pen test tools.

We can offer one time, or monthly penetration testing, or offer it as part of a larger IT Audit or Risk Assessment.

 

External penetration testing is an integral part of an overall network vulnerability assessment, and will include

Automated scans with tests for:

  • Open ports and inappropriate services
  • Operating system vulnerabilities
  • Known web server vulnerabilities

Manual probes, which may include:

  • Verification of vulnerabilities detected
  • Use of white hat tools

This scanning incorporates tests that address more than 50,000 known vulnerabilities and weaknesses.  Tests will be configured to run in a non-destructive manner in order to prevent disruption of critical services.