An attacker need only detect one weakness to breach your network and take control; in other words, every potential security weakness must be identified — and secured — in order to protect your company’s digital assets.

Vulnerability and infrastructure analysis and recommendations are based on industry standards including best practices and guidelines from:

    The International Standards Organization (ISO) 17779
    The National Institute of Standards of Technology (NIST) Computer Security Division (CSD)
    The U.S. Department of Homeland Security’s Information Analysis Infrastructure Protection (IAIP) Division
    The National Security Agency (NSA) Information Security (INFOSEC) Program
    The CERT® Coordination Center
    The SANS Institute

e- Security Assessment
Identify those weaknesses and compromises that can be exploited over a network, and plan for how you want to deal with them.
This Assessment is a compilation of findings associated with the YOUR IT security and network architecture based on an external and internal vulnerability assessment, high-level infrastructure review, and review of security policies and general security best practices.

e- Secure Infrastructure
We feel that security in layers is an important part of protecting your information assets. Firewalls and IDS systems are necessary pieces of the security infrastructure, but they are not infallible, nor are they 100% trustworthy. It is important to implement as many security practices as possible; if one system fails, another should pick up where it leaves off.

e- Secure Messaging
Unethical e-mail senders bear little or no cost for mass distribution of messages, yet normal e-mail users are forced to spend time and effort purging fraudulent and otherwise unwanted mail from their mailboxes. The problem with spam is that it tends to swamp desirable e-mail.

Send mail to web/at/ with questions or comments about this web site.
© 2006 Vizion Technologies. All Rights Reserved.
Last Modified 2/05/06