Security

  Security is comprised of 3 basic issues:
  • Who did it? (Authentication, Digital Signatures, Identity Authority, Access Authority)
  • What did they do? (Audit Trail, Data Integrity, Content and Virus scanning)
  • Who can see it? (Message encyrption, VPN, Authentication and Access Authority)

Of course, having these issues covered is not enough. You need a comprehensive, and most of all, fully integrated solution. This starts with the Security Polciy and Risk Assessment, moves on to Solution Selection and Implementation, and ends with Auditing and Review (from where it begins all over again).

Secure Information Technologies is needs-focused and product agnostic, so we will never push solutions to you. Rather, we work with you, as a partner should, assessing real business needs, and using real business terms, we help you to prioritize, plan, implement and audit your integrated security solution.

The following is a list of the types of products and services we have assisted our clients with.

  Security Policy
  • Auditing, Review, Recommendations
  • Conception, Creation, Project Management
  • ISO and Government Compliance Assistance
  • Symantec - Enterprise Security Manager

Internet / Intranet
  • System Security Auditing
    • Solaris 2.6/7/8/9
    • Windows NT 4/2000/XP
    • RedHat Linux 6/7
    • Mac OS 9/X/X Server

  • Firewall Security Policy Auditing and/or Implementation
    • CheckPoint
    • Raptor
    • Gauntlet
    • PIX
    • IP Filtering - CISCO / Nortel / OS / TCP-wrapper

  • Network Vulnerability Auditing and/or Implementation
    • SATAN (sniffing)
    • Nisus (sniffing)
    • ISS - RealSecure
    • Symantec - Vulnerability Assessment
    • Symantec - NetRecon
    • Ethical Hacking

  • Intrusion Detection
    • Tripwire
    • McAfree - IntruShield
    • ISS - RealSecure
    • Symantec - IDS, Intruder Alert, ManHunt, Decoy
    • Others Upon Request

Content Security and/or Virus Protection
  • Trend Micro VirusWall (transparent or CVS)
  • Norton AntiVirus for Firewalls (CVS)
  • Norton AntiVirus for Domino
  • SSL and Trust Authority Configuration
  • Others Upon Request

Authentication / Single Sign-on
  • LDAP Design and Integration
    • SunOne / iPlanet
    • Active Directory Design and Integration
    • University of Michigan LDAP
    • Mac OS X / OS X Server

  • Single Sign-on Design and Integration
    • SunOne / iPlanet
    • Netegrity
    • NIS
    • NetInfo

  • PKI Design and Integration
    • Active Directory PKI Services Integration
    • SunOne / iPlanet
    • Kerberos / RSA / MIT (UNIX)
    • RSA Security - SecureID
    • RSA Security - Keon
    • SunOne / iPlanet

  • Digital Signatures
    • Adobe Acrobat
    • RSA Security - RSA e-Sign

E-Commerce Enablers
  • Online Transaction Automation
    • Verisign - Payflow Pro CC Authorization Integration

  • Digital Rights Management
    • Adobe Content Server

  • Site Encryption and Trust
    • Verisign - SSL Certificate Integration

We are proud of our work, but we also respect the privacy of our clients. References are available upon request for serious inquiries only. Due to the nature of our work in this area, specific solutions may not be directly attributed to specific clients.