Contenu connexe Similaire à Axoss Wireless Vulnerability Assessment Services (20) Axoss Wireless Vulnerability Assessment Services2. WHAT ?
How confident are you that your wireless network can withstand the latest attacks by hackers?
Do you really know WHERE YOUR WEAKNESSES are?
ABOUT AXOSS
Beyond the authorized wireless infrastructure you know exists in your organization, what about
the wireless networks that aren’t supposed to be there? Axoss is a vendor independent
Do you know when an onsite vendor or consulting company tucked away in a forgotten Information Security Consulting firm
that delivers Security Assessment
conference room plugs in their mobile access point?
Services across the public and private
What about that temporary access point in a QA lab that is still there months later? sectors.
WIRELESS VULNERABILITY ASSESSMENT is a test of wireless network environment to assess Axoss was founded by information
security. security experts, to provide top of line
Security Consulting Services that
tailored to meet our clients' needs.
Axoss core services can be broken
down into four categories:
WHY ? • Penetration Testing
• Vulnerability Assessment
WIRELESS networking is one of the most POPULAR and fastest growing TECHNOLOGIES on the • Security Consulting
market today. As many organizations deploy wireless networks as EXTENSIONS to their • Security Training
existing network, the THREAT FROM WIRELESS vulnerabilities is frequently misrepresented,
misunderstood, or often simply ignored. The rapid spread of wireless technologies among both Axoss has in‐depth knowledge of the
business and personal systems has improved interoperability and accessibility. However, this challenges faced by many
very ubiquity has also led to an INCREASE in the number of threats to computer networks. organizations in protecting users,
Wireless technologies have given attackers new ways to STEAL SENSITIVE information, tamper networks and critical business
with business processes, and subvert network security enforcement mechanisms. information from malicious attack or
theft.
We always aim to deliver scalable
solutions so that every company,
whatever their security budget, can
continue to enjoy access to our
WHEN ? expertise.
Some of organizations that house sensitive information may have a corporate policy stating
that wireless LANs are NOT ALLOWED. They may think that this “NO‐USE” POLICY keeps their http://www.axoss.com
networks safe and secure, but they are gravely mistaken. A ROGUE ACCESS POINT could be
placed on their network by intruders or by employees, and without a WIRELESS INTRUSION
detection system, there would be no way to know that all of their security mechanisms have
been BYPASSED ‐ giving full access to anyone within 300 feet of the facility.
WIRELESS VULNERABILITY ASSESSMENTS should be done on a PERIODIC basis to ensure that
the security posture of the wireless network remain secure and identify any threats facing the
networks. Because ATTACKS and environments are CONTINUALLY CHANGING, a through
assessment schedule should be implemented by network management.
All contents are Copyright © 2008 Axoss Information Security. All rights reserved.
Axoss Public Information.
3. WHERE ?
AXOSS has extensive EXPERIENCE helping clients identify access points and rogue devices,
ANALYZE their security configurations, test for vulnerabilities, and IMPLEMENT security policies ABOUT AXOSS
that minimize this risk.
Axoss is a vendor independent
Axoss Wireless Vulnerability Assessment Service can help your organization: Information Security Consulting firm
• locate and IDENTIFY broadcasting wireless network devices that delivers Security Assessment
• DETERMINE the security of selected devices through hands on review and wireless Services across the public and private
"sniffing" techniques sectors.
• ENSURE wireless configuration adequately PROTECTS information assets and does
Axoss was founded by information
not introduce vulnerabilities into the environment security experts, to provide top of line
• TEST the operational EFFECTIVENESS of security policiesand procedures Security Consulting Services that
tailored to meet our clients' needs.
Axoss core services can be broken
down into four categories:
HOW ? • Penetration Testing
AXOSS uses a variety of public and proprietary TOOLS to ASSESS your wireless infrastructure. • Vulnerability Assessment
These tools allow us to SURVEY the airwaves for Access Points and clients using 802.11a/b/g • Security Consulting
• Security Training
frequencies. Axoss Wireless Security Assessment APPROACH is specially tailored to your
environment so we can assess the true vulnerability of your wireless infrastructure. Using this Axoss has in‐depth knowledge of the
approach, we can MAXIMIZE your investment in wireless security, lower your liability and challenges faced by many
increase data CONFİDENTİALITY. organizations in protecting users,
networks and critical business
Axoss PERFORMS Wireless Vulnerability Assessment following the OSSTMM Wireless Security information from malicious attack or
Testing METHODOLOGY. Axoss Wireless Vulnerability Assessment PROCESS involves theft.
• IDENTIFY access points and rogue devices
• ANALYZE security configurations We always aim to deliver scalable
solutions so that every company,
• TEST for vulnerabilities
whatever their security budget, can
continue to enjoy access to our
When testing is complete customers receive a DETAILED REPORT of how and where your expertise.
wireless network is vulnerable to attack along with EXPERT ADVICE on how to eliminate these
vulnerabilities. Axoss DELIVERS a complete report containing: http://www.axoss.com
• EXECUTIVE Summary
• TECHNICAL Report
• Solutions RECOMMENDATION Report
WHO ?
AXOSS has been delivering Information Security CONSULTING services to help clients
MITIGATE risk, secure their infrastructure and PROTECT their assets. We are FOCUSED on
IMMEDIATE vulnerabilities and overarching DESIGN PROBLEMS relating to poor segregation of
networks and WEAK ENCRYPTION to assist organizations in attaining a hardened wireless
deployment.
We welcome any questions or requests you may have about our Wireless Vulnerability
Assessments service. Please don't hesitate to CONTACT US and one of our consultants will get
back to you as soon as possible.
All contents are Copyright © 2008 Axoss Information Security. All rights reserved.
Axoss Public Information.