Information technology risk management and computer security consulting | Vancouver, Canada, | specializing in network and wireless security
Home
Services

Vulnerability Assessment
Penetration Testing
Security Policy
Remote Access
Intrusion Detection
Wireless Security
Privacy Policy
Privacy Audit
Security Awareness
Security Training
About Us
Consultants
News
Contact Us
Links

Services: Remote Access Security Architecture

Remote access for vendors and employees often creates one of the most significant vulnerabilities in an organizationís network perimeter. Remote access is quickly becoming common place and is most often required by those with access to an organizations most sensitive systems and data.

Many solutions exist for remote access and they can be configured to provide moderate security; however, given the information and systems that are being accessed, many organizations have not properly balanced their risk equations. Simple encryption and even encrypted tunnels are usually inadequate for most applications.

Network routing controls, two-factor authentication, split tunneling restrictions, protection of the internal network from remote access points, and remote user policies and procedures all need to be considered.

Risk Assessment

Internet Vulnerability Assessment
Network Penetration Testing
Security Policy, Process, and Procedure Review

Design and Implementation

Secure Remote Access Infrastructure
Intrusion Detection System (IDS)
Secure Wireless Networking

Privacy of Personal Information

Development of Privacy Policy
Privacy Policy Audit

Awareness and Education

Management and Staff Awareness
IT Staff Security Administration Training

[Back to Top]

Home | Services | About Us | Consultants | News | Contact Us | Links