Security Assessment Services
Data Center Power Audit
A professional Power Audit by Benelec can spot areas of vulnerability and recommend solutions before power problems bring operations to a stop. Blackouts, brownouts, surges and other power problems can disrupt every sector of your organization, from the data center to the conference room.
The risks include :
- System downtime (blackouts)
- Hardware damage (brownouts and power surges)
- Data corruption or loss (blackouts, brownouts, power surges and line noise)
- Performance problems (brownouts and line noise)
The Power Audit will help you identify and manage these risk factors by:
- Carrying out a survey of your total power environment
- Locating and prioritizing trouble spots recommending a cost effective power protection solution
End Point Security Assessment
Our End Point Security Assessment will help you to identify the threats to an organization security via endpoints – the user control devices that connect to the network. It will also facilitate you further to integrate the endpoints into your secure network. This exercise will help you to reduce the Total Cost of Ownership (TCO) for each device as well as eliminate financial and reputational costs of a data breach.
Technical Expertise
|
Area |
|
Technologies |
|
Operating Systems |
|
Win 2003, 2008, Linux, Sun Solaris,HP-UX, IBM AIX,Novell Netware |
|
Databases |
|
Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, Sybase, Ingres |
|
Firewalls |
|
Cisco PIX/ASA, Checkpoint, Juniper, Watchguard, Sonicwall, Fortigate, Cyberroam. |
|
Intrusion Detection Systems |
|
ISS RealSecure, Cisco Secure, Dragon IDS, Fortinet, Snort, Juniper, Tipping Point |
|
Network elements |
|
Routers, Switches, Load Balancers, Wi-Fi, NAC |
|
Web Servers |
|
IIS, Apache, Tomcat |
|
Messaging Servers |
|
Microsoft Exchange, Sendmail, Qmail, Lotus Domino |
|
Others |
|
ISA Proxy, Squid Proxy, Blue Coat Proxy, PacketShaper, Allot, SSL VPN |
Our Other Services
- Data Center Analysis
- Product/Solution Evaluation
- Server Hardening
- IT Security Policy Documentation
- Security Configuration Reviews
- ISMS Consultancy, Implementation & Assessment