PROTECTUS provides a solution for organizations that have Information Security requirements but do
not need an additional, full-time Information Security staff member.
Our highly trained and
experienced staff will learn about your business requirments, become familiar with your
unique environment, and implement our toolkit.
The PROTECTUS Team provides specialized tools and expertise to supplement your Information Technology team. Also,
we continually update our capabilities based on the results of our Research & Development efforts.
Our KnightHawk™ Network Security and Performance Service
bundles our talent, time, and tools into one complete package. This allows us to efficiently and
effectively provide a combination of the following according to your changing needs:
– uses our Sentry sensor to collect
security and performance data, logs, traffic statistics, and much more from
your network. The collected data, along with other
knowledge about your network, is analyzed and reviewed
to provide an up-to-date, comprehensive view of the network’s
security and performance. The Sentry reveals what is actually happening on your network.
The same monitoring toolset used by the PROTECTUS team is available for your use anytime.
- Identify abnormal network traffic
- Debug network and application problems
- Measure network performance
- Monitor security, performance, and status
– combines our experience with knowledge about your unique environment to seek out and
implement the most viable solutions based on your specification, budget, and schedule.
Whether it's product evaluations, product deployments, special projects, isolating network
bottlenecks, profiling network traffic, or simply answering
your questions, we'll work with you to find the answers you need
– without all the techno-babble.
- Answer your questions
- Provide knowledge transfer
- Make recommendations
- Help implement improvements
Audit Preparation and Remediation
– involves a variety of
tools and techniques depending on the your needs.
One technique is Ethical Hacking which provides a friendly set
of eyes that probe your network for weaknesses.
Whether it’s protecting vital business information or
preparing for your next audit, we can help to find and strengthen
the weakest link.
- Regulatory Compliance
- Payment Card Industry (PCI) Standards
- Data Confidentiality, Integrity, and Availability
- Voice over IP (VoIP) Pre-Assessments
- Remote Access
- Wireless Security
- Vulnerability Scanning
- Web Application Security
– instills trust and confidence in your customers by
assuring them that a qualified, independent, third party is working with you
to protect their personal information. Click-on the Red Castle logo to learn more.
– although we emphasize a proactive approach, our Certified Incident
Handler staff can and will respond to your needs even after "the bits have hit the fan"
in an emergency situation. A security incident or data breach is not the worst thing
that can happen to your organization.....but an unprepared, poor response might be.
BACK TO TOP
© 2011 PROTECTUS ®