Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!

Internet Security

Penetration Testing

Save your company's valuable data with Proxy Sentinel™ from Internet Security. Click here for all the details.

Internet Security.ca has many years experience in penetration testing on large corporate and government IT networks and can completely verify your network for any attempts to the integrity of your network. Additionally, Internet security.ca is in a unique position to offer your company the best consultative Internet security services and advise you on the best possible Internet security and firewall solutions available today.

Internet security.ca offers professional network security Penetration Testing. Many of our clients have asked for less intense security assessment offerings. They want us to check for known vulnerabilities in their networks, without including the more rigorous authentication systems subversion and service exploit methodologies that we normally perform. In essence, what a lot of them want is network testing that is fairly fast, simple, inexpensive and comprehensive. Internet security.ca is pleased to announce our new offering: the Small Business Internet Security Package.

The Small Business Internet Security Package includes the most essential vulnerability scans, security analysis, and technical reports. Internet Security.ca uses a wide range of tools and performs extensive tests developed over the years through penetration testing experience with high-profile clients. Although the Small Business Internet Security Package does not include penetration testing, the information from our Small Business Internet Security Package will give a realistic external perspective on your network's security and integrity.

This high-impact vulnerability assessment package includes comprehensive testing for over 1,200 network vulnerabilities. Technical aspects of the Small Business Internet Security Package includes:

      Detailed network mapping and systems identification
      Identify and address over 1000 technical vulnerabilities
      In-Depth web security inspection - over 440 web security checks
      Information-gathering attacks probing ICMP, UDP, and TCP services
      Thorough multiprotocol TCP/IP stack interrogation of each IP address

Our Small Business Internet Security Package include a full and detailed report of all vulnerabilities that we find including:

      Detailed Network Map
      Prioritized List of Action Items
      Vulnerability Repair Instructions
         plus a whole lot more.

Large Enterprise Internet Security Package

Our Large Enterprise Internet Security Package includes all the vulnerability tests, analysis and reporting that are offered through the Small Business Internet Security Package with the additional and highly important Penetration Testing feature. Our Penetration Testing feature is the highest quality, high-level Internet security testing that requires the time and effort of experienced network security penetration testing experts to break a system's security and submit methodology documentation. Simple, step-by-step instructions will be provided to clients so problems can be fixed without delay.

Some technical aspects of our Large Enterprise Internet Security Package include:

All tests from our Small Business Internet Security Package, plus:

      Detailed network mapping and systems identification
      Identify and address over 1000 technical vulnerabilities
      In-Depth web security inspection - over 300 web security checks
      Information-gathering attacks probing ICMP, UDP, and TCP services
      Thorough multiprotocol TCP/IP stack interrogation of each IP address

Our full Penetration Testing feature includes:

Current remote exploits performed by certain hacking groups or obscure underground hackers that are too new to be included in our automated scanning tools or our Penetration Testing apparatus.

Additionally, Internet Security.ca has developed a specialized "bruteforce library" created from website, zone information, hostnames, usernames, and optionally, available public forums or private forums.

Authentication system subversion auditing using our high-risk librairies and alternatively our customized "bruteforce library" listed above. Services tested may include netbios, telnet, ftp, rsh, ssh, rexec, rlogin, pop3, smtp, http, imap and optionally ldap, sql, oracle, and other databases.

Full manual web security inspection: testing of custom CGI scripts that could be in use or any other form of scripts such as PHP or other variations.

Firewall subversion techniques including source porting, source routing, spoofing, DNS alteration, ftp bouncing, fragmentation or any other network security breaches or attemps to its security, using extreme techniques seldomly encountered in the normal workplace.

Social Engineering and wardialing on special arrangements: additionally, we even offer "dumpster diving" for an additional fee.

Our full Penetration Testing feature includes a detailed report of all network security vulnerabilities that we find including, but not limited too:

      Detailed Network Map
      Prioritized List of Action Items
      Vulnerability Repair Instructions

Additional Post Testing Analysis Services

If your company has been audited recently, Internet Security.ca can perform penetration testing on your network to verify the effectiveness of the previous audit. If you have been audited by another vendor then you could be at risk. Here is what we mean by this:

Many vendors, including some of the largest names in the business, rely only on simple and low-grade scanning tools for their whole assessment. These un-sophisticated tools can create false positives, waste valuable IT staff time and generally deliver "false negatives", leaving security holes open for outright attack. Internet Security.ca uses a variety of robust toolsets that we have developed in our labs and that fully verify all network security vulnerabilities found.

Internet Security.ca will fully scan for thousands of vulnerabilities that are not presently tested by most of the commercial scanners. Our scans are amongst the fullest and most complete in the industry of network security.

Additionally, new network security vulnerabilties are discovered or disclosed every day and Internet Security.ca always stays abreast and current of all these important new developments on a daily basis.

If your company has been audited recently by another vendor and if your'e not fully satisfied or comfortable with the quality of the results, then contact us today and we will be in a unique position to fully verify the integrity and current state of your IT network's security status.

Back to the top of the page.         
Click here to order your Proxy Sentinel™ Internet security server today!

Proxy Sentinel™ is the most secure Internet proxy server on the market today. Click here for more information.
Site optimized by Pagina+™
Powered by Sun Hosting
Search engine keywords by Rank for Sales
Development platform by My Web Services
Internet Security.ca is listed in
Global Business Listing

| Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact |
Copyright © Internet Security.ca 2003    Terms of use    Privacy agreement    Legal disclaimer