user_mobilelogo

Highly knowledgeable

Michael is highly knowledgeable in the cyberspace security field.

I was able to attend a workshop that Michael served as panel member, at FIU during the 2013 South Florida PMI's Day of Excellence. His insight sparked great interest and awareness on the various threats and measures that IT practitioners and organizations must consider to address and protect that data assets. What I admire the most about Michael is his ability to share his knowledge and provide sound best practices that will help in being successful IT professionals. For this and many other reasons, I greatly recommend Mr. Michael Scheidell.

Greg Chavarria, PMI, ITIL, CISSP.  Private Sector IT Director

Extremely Knowledgeable

Decades in telecommunications have taught me to recognize the true professionals of whom Michael Scheidell is the best in his field. Michael is a true web technology expert and totally dedicated to servicing his customers. Michael is also extremely knowledgeable of both the plethora of data threats as well as how best to configure against them for the maximum benefit of his clients. He is also a real data security geek who has developed, upgraded and patented a masterful data intrusion detection system.

Read more ...

An external penetration test can be used to find external vulnerabilities in your network.  We wrote many of the programs and tests currently in use by both commercial and open source pen test tools.

We can offer one time, or monthly penetration testing, or offer it as part of a larger IT Audit or Risk Assessment.

 

External penetration testing is an integral part of an overall network vulnerability assessment, and will include

Automated scans with tests for:

  • Open ports and inappropriate services
  • Operating system vulnerabilities
  • Known web server vulnerabilities

Manual probes, which may include:

  • Verification of vulnerabilities detected
  • Use of white hat tools

This scanning incorporates tests that address more than 50,000 known vulnerabilities and weaknesses.  Tests will be configured to run in a non-destructive manner in order to prevent disruption of critical services.