Protecting your IT network and data security is a must in business today.
Because IT security is a very complex and ever-changing environment, specialized training and dedication is necessary to understand and provide these services correctly. Just because an I.T. company claims to offer security services, take the time to compare qualifications and check client references before you choose a technology partner; your data and systems are worth it.
EDTS engineers hold an extensive list of certifications and are experienced in providing these services. We specialize in identifying, protecting and resolving IT security threats.
Our team will perform a rigorous, comprehensive audit of security within your organization, providing specific, actionable insight to mitigate risk. The audit process identifies critical information and security issues, and helps develop a plan for layered protection against both internal and external threats.
Likewise, if you suspect that you may have had a security breach, EDTS’ forensic investigators can help you diagnose the situation, mitigate the immediate threat, and collect and preserve evidence to assist authorities in prosecution.
Custom Tailored to your Organization
From viruses and Trojan horses to spam, spyware or corporate espionage, threats are everywhere today. And with companies accountable for security of consumer and corporate data through government regulations and contractual obligation, don’t “hope for the best” in protecting your data. Schedule an EDTS Network Security Audit today, custom tailored to your organizational requirements, and including:
- Threat Modeling
- Social Engineering
- Penetration Testing
- Vulnerability Assessment
- Network Integrity Review
- Wireless Assessment
EDTS performs a systematic examination of a client's network that includes configuration, infrastructure, servers, workstations, backup scheme, security and policies.
This thorough examination is a benefit to the management team as well as the IT staff. We provide an objective set of eyes and proven methodology that identifies the strengths and weaknesses of a network. It is an independent verification that the company's resources are being used wisely and that the investment in technology is being delivered. Documentation is a key component of any system; however, it is often neglected by a staff that is overworked or by vendors that do not take the time to prepare it.
Our Network Assessment is based on the specific recommendations of vendors such as Cisco, Microsoft and industry best practices from firms such as the Gartner Group and the SANS Institute. Additionally, we apply our extensive real-world knowledge and years of experience assisting clients of different sizes and in many different industries. The product of the review is a document that provides a concise summary of your network's configuration, lists any deficiencies, and details a list of recommendations. This document also contains detailed network diagrams and network information that is critical to a company.
Penetration Testing is a method of evaluating the security of a network or computer system by simulating the process that an outside malicious hacker would use to gain access to your network.
EDTS starts by only knowing publically available information about your company such as an email address or Domain name; from there we use both commercial tools and publically available software to scan, map and expose security holes you may have.
Once we "map" your network and know what systems are in place, we then use specific tools to test the known vulnerabilities of those systems. Lastly, we use "social engineering" to attempt to gain access to your facility or learn the passwords of your employees. This is a direct test of your staff's compliance with your network security policy and typically serves as a wakeup call to most organizations.
EDTS provides you with a detailed report including an executive summary explaining the vulnerabilities found and recommendations for remediation.
EDTS can design and implement enterprise class firewalls, intrusion prevention systems, demilitarized zones, secure wireless, VPN access, anti-virus, content filtering, proxy servers, anti-spyware, and SPAM filtering solutions to meet today's complex security challenges.
Our engineers are trained and certified on the products and solutions we provide. EDTS focuses on industry leading products to meet your organization's needs while ensuring your return on investment from the solution is maximized.
When you need help the most, EDTS is there. If you find yourself a victim of a security breach from a virus, hacker, disgruntled employee, or other source, EDTS can make sure you respond appropriately. Our team of security specialists will immediately monitor firewall and server activity, preserve firewall and server access logs (to be used to help prosecute the offenders), take measures to prevent further information loss, and notify the appropriate authorities for you.
Our goal is to restore your normal operations quickly while ensuring we protect your data and gather the necessary information to prosecute the offenders.
EDTS uses a thorough set of tools, trained & certified engineers, and over 10 years of experience doing vulnerability scans to help you identify threats and risks inside of your network. Unlike penetration testing, which is done from the outside trying to get into your network; Vulnerability Scanning is performed on your Internal Network.
This non-intrusive process scans every device on your network and identifies possible vulnerabilities by examining the hardware, operating systems, and applications on your network. This scan identifies missing or out-of-date patches, service packs, application updates, IOS updates, and anti-virus updates. These vulnerabilities are categorized by the threat level they pose to your security stance (Low, Medium and High) in the detailed report that you receive.
These scans provide great insight into your network security stance; however...they typically produce hundreds of pages of findings. EDTS does not simply give you this huge report and leave you to dig through the results. We perform a detailed analysis of the vulnerability scan findings to reduce "false-positives" and prepare an executive summary of the findings. We then meet with you to help you understand the critical issues that were found and formulate a remediation plan that meets your company's objectives.
Vulnerability scans are a critical part of meeting certain compliance standards such as, HIPAA, GLBA, PCI DSS, Sarbanes-Oxley, and FISMA.
Contact us about your IT security needs. We have locations in Augusta, GA and Columbia and Greenville, SC and provide security audit services and comprehensive network and data security solutions to clients throughout the Southeast.