Security Assesment

Our Solution focuses on security assessment services that entail deep technical expertise and knowledge. With a confirmed methodology in identifying vulnerabilities, security control gaps estimation and dynamic threat profiling, we are at the front in delivering risk mitigation controls that extends across any enterprise architecture. We provide the most inclusive detailed security assessment services by the use of commercial and internal developed assessment tools. Our assessment services can be used in the following focus areas;

  • Vulnerability Assessment & Penetration Testing
  • Black Box Ethical Testing – External / Perimeter
  • Vulnerability Infrastructure Management
  • ERP/SAP/ Oracle Security Audits
  • Integrated Communications Audit
  • VoIP SIP Security / Tele-presence security / UC– via Viper LAB tools
  • SCADA Security assessment Tool-kit
  • Industrial Control-Systems Security inclination
  • Defense in Depth – Application White listing Techniques / USB Malware Infection / Air Gap Protection Assessment
  • Mobile Network protection
  • UMTS / LTE – GTP Scan / SCTP Scan / Spoofed TEID and Fuzzing / APN bruteforce
  • Fixed Mobile Convergence – SeGW and IMS Security
  • Endpoint IP Discovery & Network Leakage Detection
  • Rogue and Unknown Network Detection
  • Backdoor connections (xDSL/ 3G / Rogue WiFi and leaking endpoints discovery)
  • Availability Assessment
  • DDoS Protection – Botnet / Zombie Detection
  • Web Portal Availability / DNS Server Protection – Protocol Fuzzing, DDoS attack simulation
  • Core Network Security
  • MPLS – MP-BGP and VRF Security (RT import and export analysis) / PE-CE security and label insertion
  • VPLS – Spanning Tree, ARP poisoning, MAC spoofing