Security advisory service scope

The scope of this service depends on the kind of project. As an example, the scope may be focused on a specific set of subjects and include one or more of the following vectors:

  • Corporate security policies;
  • Data protection and cryptography;
  • Public key infrastructures (PKI);
  • Network architecture and security infrastructure;
  • Virtual private network security (VPN);
  • Wireless network security (Wi-Fi);
  • Secure remote access to the information system;
  • Voice over data security (VoIP);
  • Intrusion detection and prevention systems (IDS/IPS);
  • Content filtering, anti-spam, antivirus and anti-spyware;
  • Access control systems / Strong authentication;
  • Application controls hardening; and
  • Server and workstation controls hardening.

« Previous