user_mobilelogo

Consummate InfoSec Professional

Michael Scheidell is a great example of a consummate information security professional. Michael contributed a great deal to the successful implementation of our Information Security Program at Banco Internacional De Costa Rica when I was the V.P. of IT at that institution. Michael understands the importance of identifying the risk inherent on a network infrastructure, but more importantly, he is able to design and implement solutions that would minimize those risks to an acceptable level.

Ray Guzman, Former VP of IT

Detail Oriented Security Expert

Michael is a detail oriented security expert who has conceptualized future looking security changes and has addressed them through software and product develop. I have used Michael in several projects across multiple organizations and entrusted all my real time email and penetration testing to he and his products.

James Sampel, Managing Director Global Operations and Chief Information Officer at Greenwich AssociatesGreenwich Associates

An external penetration test can be used to find external vulnerabilities in your network.  We wrote many of the programs and tests currently in use by both commercial and open source pen test tools.

We can offer one time, or monthly penetration testing, or offer it as part of a larger IT Audit or Risk Assessment.

 

External penetration testing is an integral part of an overall network vulnerability assessment, and will include

Automated scans with tests for:

  • Open ports and inappropriate services
  • Operating system vulnerabilities
  • Known web server vulnerabilities

Manual probes, which may include:

  • Verification of vulnerabilities detected
  • Use of white hat tools

This scanning incorporates tests that address more than 50,000 known vulnerabilities and weaknesses.  Tests will be configured to run in a non-destructive manner in order to prevent disruption of critical services.