Inicio security

6
Inicio security ToBe Security es una compañía líder de mercado, pionera en proveer Evaluaciones de Seguridad de Penetración de Información, Capacitación y Servicios de Consultoría a organizaciones a nivel mundial.

description

ToBe Security es una compañía líder de mercado, pionera en proveer Evaluaciones de Seguridad de Penetración de Información, Capacitación y Servicios de Consultoría a organizaciones a nivel mundial.

Transcript of Inicio security

Inicio securityToBe Security es una compaa lder de mercado, pionera en proveer Evaluaciones de Seguridad de Penetracin de Informacin, Capacitacin y Servicios de Consultora a organizaciones a nivel mundial.We offer a wide range of programs to improve information security in business services.Ethical HackingIntrusion test which examines whether the network or servers are vulnerable to hacker attacks. This study attempts to penetrate the network and gain control over computers or servers. This study done internally or externally. As a result of this study is given to the client a report with the threats found and action to mitigate them.Ethical Hacking WirelessAnattempttopenetratethewirelessnetworkclient.Inthisstudytheconfigurationofwirelessequipment,thestrengthofthe encryptionalgorithmsusedandtheefficiencyofITequipmenttodetectsuchattackstoyourwirelessnetworkanditsaccess points are analyzed.Client Side attacksIn this study we send malicious code to end users through emails or send links that point to malicious web site with which we arm. TheaimofthisstudyistoseeifyoucanpenetrateandHackerstationstakingadvantageofinsecureusersconfiguring workstations for users and the lack of knowledge of the users to open any mail. The ultimate goal of this study is to see if we can take control of the network by first taking control of a workstation by sending malicious code to end users.Social Engineering AttackChecktoseeifyoucanphysicallyentertheofficesofthecustomerwithoutauthorizationdoingdifferentmanipulationsand deceptionsguardsand/orallcompanypersonnel,forexamplestatingthatwecametodeliverapackage,wearepartofthe cleaningequipmentetc.Inthisstudytelephonecallstoemployeesalsoconductedandmanipulatingtoobtainconfidential company information such as trade secrets, passwords of users etc. Theobjectiveofthisstudyistoshowtheclientthatispossiblethroughanattacksocialengineeringtoobtainadmissiontothe customer's network or its buildings.Awareness plan for end usersIt will be a training for users on security issues and how to care information company. In this training you will prove to users the dangerstotheirinformation,suchastheriskofopeninganymailandattachments,risksofsocialengineeringattackstoyour network, security workstation, safe surfing on the internet , safety in social networks etc. Thisplanwillbeheldawarenessthroughtalks,banners,posters,reviewsandvideos.Itisnoteworthythat70%oftheIT infrastructure risks coming from end users themselves which they have no training against cyber threats.Security AssessmentA consultancy in which the configuration of your network and computer security controls implemented are analyzed. The study will analyze the following:1. Network topology2. Configuring Routers.3. Configuring Firewalls4. Configuring servers5. Configuring the DMZ6. Configuring the IPS (Intrution Prevention System) their false positives and negatives7. Configuring Layer 2-3 Switches8. Hardening proseguimientos implementation of different teams9. Network segmentation10. Analysis of Logs11. WAF deployment and SIEM12. Recommended configuration for PCs13. Detection of Sniffers installed on the network14. Reviewing Incident Response Policy