Managed IT security, SecurePOINT | Waypoint Online Security

Small Business IT Security


SecurePoint – Simple. Secure. Confidence.

Nearly 100% of unprotected companies will experience a potentially game-changing technology invasion. Keeping your company’s email and technology secure from internal and external threats is critical.

SecurePOINT guards your company’s technology assets with a complete range of functions with the convenience of an all-in-one network security appliance and proactive support and monitoring.

Operate in confidence.

  • Protect your company from spam, spyware, and viruses
  • Enforce safe and productive use of company technology
  • Defeat targeted attacks

Explore our securePoint solutions.

  • Edge Intrusion Prevention and Network Security
  • Company Awareness: Safe and Productive Technology Use
  • Cyber Security

Security Assessments

Combine the latest best-in-class security equipment and practices with our top-notch security assessments, and you’ve got defenses to make a hacker quake in his boots. Our pros analyze your web applications, websites, and network from the vantage point of an external attacker. We use automated testing tools and personal inspection by a GIAC/CSEC certified information security expert. We not only look at the common entry points that hackers typically use to gain unauthorized access, but we also systematically evaluate your site for other potential entry points, providing a comprehensive security assessment strategy.  Once we have completed our assessment, we provide a detailed report outlining any discovered vulnerabilities and the recommended remediation steps to properly secure your site.

Network security services like web application and network penetration testing is a first line of defense. It can identify rogue services operating at your expense, as well as likely entry points for penetration.

However, for many companies, the largest security risk is internal. That’s why our social engineering assessment evaluates the security of your people, by attempting to lure them into taking unsafe actions or divulging sensitive information. We execute a multi-layered attack on the target through direct communication. The assessment is not designed to call out individual employees, but rather to uncover vulnerabilities. Our detailed report recommends remediation and training tailored to the specific weaknesses uncovered during the assessment.

Our network, web application, and social engineering assessments include:

  • Assessment by a GIAC/CSEC certified information security expert.

  • Identification of all open TCP and UDP ports.

  • Scanning of all 65,535 available ports on each identified public IP address.

  • Scanning for firewall-specific vulnerabilities which have been discovered within the past 18 months.

  • Scanning for open service-specific vulnerabilities which have been discovered within the past 18 months.

  • Validation of appropriateness for questionable open ports.

  • Recommendations for alternative configurations to minimize security issues while still providing the required authorized services.

  • Scanning for an array of vulnerabilities and common attack surfaces such as:

  • Improper/Unsafe Data Handling (Cookies, Query Strings, Hidden Fields)

  • SQL Injection/Script Injection

  • Cross Site Scripting (XSS)

  • Information Disclosure

  • Security Misconfiguration

  • Scanning for platform-Specific vulnerabilities which have been discovered within the past 18 months.

  • Assessment of authentication/authorization techniques.

  • A detailed assessment report outlining any discovered vulnerabilities and the recommended remediation steps.

  • Customer defined employee targeting method  (You can define the specific employees to be targeted or allow us to define the targets blindly).

  • Target profile data collection from search engines, social media, and other readily available sources.

  • Password analysis based on the collected profile data.

  • Highly targeted attack scenarios which are specifically designed to simulate real-world attacks.

  • Complete confidentiality and professionalism.

  • Detailed assessment reports outlining any discovered vulnerabilities and the recommended remediation steps.

Read more about Network Penetration Testing, Application Penetration Testing, and Social Engineering Assessments.

  • Customer defined employee targeting method (You can define the specific employees to be targeted or allow us to define the targets blindly).

  • Target profile data collection from search engines, social media, and other readily available sources.

  • Password analysis based on the collected profile data.

  • Highly targeted attack scenarios which are specifically designed to simulate real-world attacks.

  • A detailed assessment report outlining any successful attack scenarios and the recommended remediation steps.

  • Complete confidentiality and professionalism.

 


"Waypoint always has the latest cutting edge computer system solutions for our firm, and I know they will recommend what is best for our firm."

Amanda Mingo, Partner, Rawls, Sheer, Foster & Mingo, P.L.L.C.

To find out more about Waypoint IT support and managed service in both Charlotte, NC and Miami, FL request a call back today!