Also called a Network Security
Assessment, Intrusion Testing, Penetration Testing, or Threat and Vulnerability
Assessment. Sanction will review all of the critical components of your
security infrastructure from both remote and local perspectives. The Assessment
will be customized to provide maximum benefit in relation to the clients
business and business needs.
Sanction, Inc. will assess
systems at the local, or operating system, level, looking for insufficient
patch levels, incomplete system hardening, and vulnerable
Management System Design
A well designed network
management system offers efficient monitoring and quick response to problems. A
poorly designed system will actually compromise your security, as well as
leaving you with blind spots that are vulnerable to undetected problems.
Sanction can help you evaluate and design a robust Network Management
Repsonse "Tiger Team" Procedures
If a security incident occurs,
do your employees know how to respond? Are your public relations personnel
trained in how to handle a hacking event? And if your company were hacked,
would you want to prosecute the hacker? Could you collect evidence that would
stand up in court? Sanction can help you answer these and similiar questions,
and design suitable Incident Response policies and
Detection System Design/Implementation
Implementing an effective
Intrusion Detection system involves both host and network analysis, as well as
designing response policies to follow in the case of a security event.
Sanction's comprehensive security methodology can help your company build
integrated solutions to these challenges.
[ Strategic ]
] [ Operational