Future
Net provides expert consulting in the following areas:
Data
Security Auditing
Business Risk Analysis
Security Policies and
Procedures Development
Vulnerability Assessment
Intrusion Detection
Systems Design and Implementation
Data
Security Auditing :
The only way to gain confidence in your information and physical access
security measures is to have them tested in the most thorough and vigorous
fashion possible. Future Net can
provide exhaustive security audits, encompassing physical access, network
infrastructure access, and system access. We utilize proven methodologies to
ensure that no potential vulnerability is overlooked or underestimated.
Security audit services can be purchased as single audits, or as a series of
scheduled/unscheduled audits over a one year period.
Risk
Analysis :
Future Net provides upper management with a business case for prioritizing and
justifying future security expenditures. Depending on the scope of the risk
analysis, the project may involve assessing sensitivity, criticality, threat,
vulnerability, and susceptibility to penetration. Results of these assessments
are compared to business assessments and the relative value of corporate
information. Deliverables include assessment reports, a briefing for security
personnel and management, and a list of prioritized recommendations.
Information
Security Architecture Design :
Future Net consultants analyze the current network security topology across
the enterprise to ensure that deployment methodologies are current with the
latest technologies and best practice standards. Our consultants utilize the
best-of-breed technology’s software.
Security
Policies and Procedures Development :
Future Net policy experts review an organization's existing security policies
and/or help develop a new security policy that meets the overall business
objectives of the organization. Robust
policies enhance the integrity, confidentiality and availability of critical
online information assets.
Vulnerability
Assessment :
Focuses on discovering the weaknesses of your information environment.
Using the state-of-the-art tools, appropriate network devices are scanned to
analyze the profile of each device and determine if any corrections are
indicated. Our consultants then analyze the data that is produced during the
scan. Deliverables include a log of the raw data produced by the scan, a
briefing for managers and security personnel,
and a list of prioritized recommendations for taking corrective action.

|