<html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <head> <title>Secure Commerce Systems - Services - Penetration and Vulnerability</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <META name="keywords" content="Internet Security, Incident Response,Security Event Management, Security Event Monitoring,SEM, Security Incident Management,SIM, Enterprise security management, Information security management, Security information management, Network Security, System Security, Managed Security Service, Enterprise, Information security, Secure Commerce Systems, Secure, Commerce, Systems, intrusions, viruses, Hackers, Crackers, OPSEC, MSSP, ISSA, CISSP, Infragard, security, Intrusion detection systems, Firewalls, VPN, antivirus, Anti-virus, SilentRunner, Vericept, SpiDynamics, Symantec, ISS, Microsoft, Sun, CheckPoint, RealSecure, Snort, Cisco IDS, Secure IDS, NetRanger, Network Ice, Black Ice, StealthWatch, NFR, Network Flight Recorder, Tripwire, AppShield, Nessus, NMAP, Cisco IOS, Unix, Linux, Firewall-1, Cisco Pix, NetScreen, Open BSD, SYSLOG, SNMP, XML, NetForensics, ArcSight, Aprisma, CyberWolf, Tivoli, Enterasys, Sanctum, Lancope, Recourse, Open, NerveCenter, Dragon, Houston, Texas, Software, GLBA , HIPAA , HIPAA Services, HIPAA Solutions, ISO 17799, security awareness, security awareness training, security awareness exam, security awareness quiz, free, free security awareness training"> <link rel="stylesheet" type="text/css" href="scs2004.css" /> </head> <!-- Transparent Image lowers table --><IMG height=65 src="http://www.securecommercesystems.com/images/transparent.gif" width=8> <!-- Main table --> <TABLE class=main_table cellSpacing=0 cellPadding=0 width=734 align=center border=0><!-- Left Column --> <TBODY> <TR> <TD class=left_col vAlign=top width="20%" height=384> <TABLE cellSpacing=0 cellPadding=5 width=175 border=0><!-- Menu --> <TBODY> <TR> <TD class=left_cell vAlign=top height=91><B>SCS Services</B><BR> <TABLE cellSpacing=0 cellPadding=0 width=165 align=left border=0> <TBODY> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/index.htm">Home</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/SCSProducts.htm">SCS Products</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/Services.htm">SCS Services</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/Products.htm">Premier Suppliers</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/GuardTowerPartners.htm">GuardTower Partners</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/Investors.htm">Investors</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/Newsletter.aspx">Newsletter</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/contact.htm">Contact Us</A></TD></TR> <TR> <TD><IMG height=6 hspace=4 src="http://www.securecommercesystems.com/images/right_arrow.gif" width=4><A href="http://www.securecommercesystems.com/Support.htm">Product Support</A></TD></TR></TBODY></TABLE></TD></TR><!-- SCS Newsletter --> <TR> <TD class=left_cell vAlign=top width=165 height=27> <DIV align=left> <HR noShade SIZE=1> <P><B>NEWSLETTER<BR><FONT color=#ffbc64>FREE</FONT></B> SCS Newsletter where Secure Commerce Systems keeps you up to date with Security news and offers discounts and special offers to our subscribers.</P> <TABLE cellSpacing=0 cellPadding=0 width=121 align=left border=0> <TBODY> <TR> <TD width=121 height=32> <DIV align=left><A href="http://www.securecommercesystems.com/Newsletter.aspx"><IMG height=14 src="http://www.securecommercesystems.com/images/join.gif" width=36 border=0></A></DIV></TD></TR></TBODY></TABLE></DIV></TD></TR></TBODY></TABLE> <TABLE cellSpacing=0 cellPadding=5 width=175 border=0> <TBODY> <TR> <TD class=left_cell width=165> <HR noShade SIZE=1> <B>DEMO</B><BR>Contact SCS today to set up a GuardTower Demo. See how SCS can protect your business.<BR><A href="http://www.securecommercesystems.com/GuardTowerDemo.asp">Read more <STRONG></STRONG></A> </TD></TR></TBODY></TABLE></TD><!-- Center page --> <TD class=main vAlign=top width="56%" bgColor=#003399>&nbsp;Penetration and Vulnerability Application Testing Services <TABLE cellSpacing=0 cellPadding=5 width=420 align=center border=0> <TBODY> <TR> <TD vAlign=top width=400 height=507> <P>Internet use, electronic commerce and the availability of hacker software have mandated the review of network and host based vulnerabilities. As a strong countermeasure, Secure Commerce Systems has developed our LifeCycle security penetration methodology that is extremely effective for testing the security surrounding information systems. This service is based on attempting to penetrate existing security in a manner that provides a  real life test of data security controls. Data security weaknesses are identified and management s attention is focused on the need for improvement. An executive summary is provided along with the raw data collected from our assessment tools to be provided to the IT staff who will resolve the identified risks.<BR></P> <TABLE width="75%" align=center border=0> <TBODY> <TR> <TD><B>Advantages</B></TD></TR> <TR> <TD height=69> <UL> <LI>Identify potential threats and vulnerabilities associated with the external network perimeter and the internal network infrastructure.</LI> <LI>Identify system configuration policy vulnerabilities.</LI> <LI>Identify denial of service vulnerabilities.</LI> <LI>Identify application and transaction vulnerabilities.</LI> <LI>Develop  quick hits security corrections and improvement opportunities.</LI> <LI>Develop best-practice recommendations for correcting and implementing countermeasures.</LI></UL></TD></TR> <TR> <TD><B>Methodology</B></TD></TR> <TR> <TD height=97> <UL> <LI>Project Initiation: develops engagement objectives and communicates the team s understanding of the rules of engagement.</LI> <LI>Phase I, Discovery: discovers the factors of the fundamental risk proposition (risk, value, threats, and vulnerabilities), and uses broad research and reconnaissance techniques to identify potential targets.</LI> <LI>Phase II, Exploration: uses non-intrusive techniques to identify vulnerabilities within the perimeter of the organization.</LI> <LI>Phase III, Intrusion: tests security controls by exploiting vulnerabilities.</LI> <LI>Phase IV, Restoration: restores changes in the client s systems to their original state.</LI> <LI>Project Reporting: summarizes and presents analysis and conclusions.</LI></UL></TD></TR></TBODY></TABLE>Using traditional  ethical hacker techniques, we identify targets and launch controlled exploits against existing security controls. Common targets include Internet perimeter, remote dial-up, internal network infrastructure, sensitive resources, enterprise applications, and decision support databases. <BR><BR>The key to implementing effective security is a comprehensive understanding of what is being protected. The penetration test assessment will provide a knowledge base of assets, their value to meeting corporate goals and their vulnerability to attack &amp; loss. This analysis will lead our experts to design an effective blueprint that will protect the integrity &amp; availability of information, minimize legal liability and implement survivability techniques to ensure our client s are among the fittest for survival. <TR> <TD vAlign=top width=400 height=29> <HR color=#b0c4de noShade SIZE=1> </TD></TR></TBODY></TABLE><!-- Footer --> <TABLE cellSpacing=0 cellPadding=0 width=418 align=center border=0> <TBODY> <TR> <TD vAlign=top width=418> <DIV align=center> <TABLE cellSpacing=0 cellPadding=0 width=401 align=center border=0> <TBODY> <TR> <TD width=401 height=54> <DIV align=center><SPAN class=footer>| <A href="http://www.securecommercesystems.com/index.htm">Home </A>| <A href="http://www.securecommercesystems.com/SCSProducts.htm">SCS Products </A>| <A href="http://www.securecommercesystems.com/Services.htm">Services </A>| <A href="http://www.securecommercesystems.com/Products.htm">Suppliers </A>| <A href="http://www.securecommercesystems.com/GuardTowerPartners.htm">Partners </A>| <BR>| <A href="http://www.securecommercesystems.com/Investors.htm">Investors </A>| <A href="http://www.securecommercesystems.com/Newsletter.aspx">Newsletter </A>| <A href="http://www.securecommercesystems.com/contact.htm">Contact Us </A>| <A href="http://www.securecommercesystems.com/Support.htm">Support </A>| </SPAN><BR><BR> <A href="http://www.securecommercesystems.com/">Secure Commerce Systems</A> 2000-2008 All Rights Reserved <BR><BR><B>Contact Webmaster</B> <A href="mailto:bwhite@securecommercesystems.com">Brian White </A></DIV></TD></TR></TBODY></TABLE></DIV></TD></TR></TBODY></TABLE></TD><!-- Right Column --> <TD class=right_col vAlign=top width="24%"> <TABLE cellSpacing=0 cellPadding=8 width=150 border=0> <TBODY> <TR> <TD class=right_cell vAlign=top width=150 height=111> <P><B>FREE OFFER!!!</B><BR>Secure Commerce Systems annouces launch of Security Awareness Training and Quiz. Try it <B><FONT color=#ffbc64>FREE</FONT></B>!<BR><A href="http://www.securecommercesystems.com/SAE.htm">Read more <STRONG></STRONG></A> <BR><BR> <HR noShade SIZE=1> </TD></TR> <TR> <TD class=right_cell vAlign=top height=105> <P><B>SPECIAL OFFER!!!</B> <BR>Secure Commerce Systems and Symantec offer deal on Deepsight alerting services.<BR><A href="http://www.securecommercesystems.com/DeepsightOfferJan2004.htm">Read more <STRONG></STRONG></A></P> <HR noShade SIZE=1> </TD></TR></TBODY></TABLE> <TABLE height=119 cellSpacing=0 cellPadding=8 width=141 border=0> <TBODY> <TR></TR> <TR> <TD class=right_cell vAlign=top height=119><B>GREAT SUPPORT</B> <BR>Secure Commerce Systems offers excellent customer services and unveils a trouble ticket system for online incident notification.<BR><A href="http://www.securecommercesystems.com/Support.htm">Read more <STRONG></STRONG></A> </TD></TR></TBODY></TABLE></TD></TR></TBODY></TABLE> </html>