Network Security

Independent, Expert Evaluation of IT Security

Security PS provides third party, vendor independent network security services to provide validation of your defenses, identify gaps in security, and help your organization take steps to reduce risk against compromise of sensitive information and IT assets. Security PS has experience in conducting active IT security assessments, scans, and penetration tests in a wide range of industries and will design an engagement to meet your goals.

Network Security Assessments & Penetration Testing

Evaluate your defenses and get a clear view of the strengths and weaknesses in your organization's networks. The experience of the Security PS team will ensure you're aware of risks and vulnerabilities on your network and provide actionable advice on how to address issues and strengthen security posture. Security PS network security assessments can be scoped to provide a comprehensive view or focus on particular areas of interest in your IT infrastructure, including:
  • Network perimeter security testing and analysis
  • Firewall and network device review
  • Evaluation of internal network security posture and threats
  • Penetration testing
  • Vulnerability scanning

Red / Purple Team Engagements

Red Team engagements are designed to simulate cyber attacks in order to measure, practice, and excercise your team's capabilities to respond to threats. Gaining experience identifying attacks and bulding confidence in how to respond to them is a multi-discipline skill that is developed by ongoing learning and practice. Security PS will design a Red Team engagement to help your team grow where the rubber meets the road for security.

Wireless Security Assessments

Wireless technologies are powerful enablers in business environments, but they must be implemented with attention to security. Security PS has trained wireless security experts to help evaluate and provide recommendations for ensuring your wireless networks are secure and meet your business security requirements.
  • Wireless network design reviews
  • Device configuration reviews
  • Wireless security testing and analysis

Social Engineering / Phishing Tests

When evaluating external or perimeter network security, one of the most challenging defenses to maintain is the "human" element. Even when IT devices are well-hardened, people can inadvertently provide an attacker with access to IT assets, bypassing technical perimeter IT defenses. Gauge the impact social engineering attacks have in your environment and test the level of security awareness of your organization's staff. Security PS can conduct a variety of realistic tests using controlled, low impact methods that provide insight to the effectiveness of your security awareness programs and human operations.