Security Assessment Services

Data Center Power Audit
A professional Power Audit by Benelec can spot areas of vulnerability and recommend solutions before power problems bring operations to a stop. Blackouts, brownouts, surges and other power problems can disrupt every sector of your organization, from the data center to the conference room.

The risks include :
  1. System downtime (blackouts)
  2. Hardware damage (brownouts and power surges)
  3. Data corruption or loss (blackouts, brownouts, power surges and line noise)
  4. Performance problems (brownouts and line noise)

The Power Audit will help you identify and manage these risk factors by:
  1. Carrying out a survey of your total power environment
  2. Locating and prioritizing trouble spots recommending a cost effective power protection solution

End Point Security Assessment
Our End Point Security Assessment will help you to identify the threats to an organization security via endpoints – the user control devices that connect to the network. It will also facilitate you further to integrate the endpoints into your secure network. This exercise will help you to reduce the Total Cost of Ownership (TCO) for each device as well as eliminate financial and reputational costs of a data breach.

Technical Expertise
  Area   Technologies
  Operating Systems   Win 2003, 2008, Linux, Sun Solaris,HP-UX, IBM AIX,Novell Netware
  Databases   Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, Sybase, Ingres
  Firewalls   Cisco PIX/ASA, Checkpoint, Juniper, Watchguard, Sonicwall, Fortigate, Cyberroam.
  Intrusion Detection Systems   ISS RealSecure, Cisco Secure, Dragon IDS, Fortinet, Snort, Juniper, Tipping Point
  Network elements   Routers, Switches, Load Balancers, Wi-Fi, NAC
  Web Servers   IIS, Apache, Tomcat
  Messaging Servers   Microsoft Exchange, Sendmail, Qmail, Lotus Domino
  Others   ISA Proxy, Squid Proxy, Blue Coat Proxy, PacketShaper, Allot, SSL VPN


Our Other Services
  1. Data Center Analysis
  2. Product/Solution Evaluation
  3. Server Hardening
  4. IT Security Policy Documentation
  5. Security Configuration Reviews
  6. ISMS Consultancy, Implementation & Assessment
Services


Quick Contact