As a consultative firm, Praetorian brings many years of experience to the table and our in-depth understanding, technical prowess, and business acumen add significant value in enhancing our clients' security posture. Through time tested, thorough methodologies, our consultants will assess your organization's security exposure in order to provide mitigation strategies, and assist in remediation efforts.
IT Security Assessment Services
Obtain an accurate understanding of your security and risk posture, while ensuring compliance with industry regulators and information security best practices.
Comprehensive, accurate, & independent security assessments
Security assessment components
Internal Vulnerability Assessments
Identifies and examines network vulnerabilities for internal, Intranet systems to determine whether they can be exploited by an attacker to compromise targeted systems or used to gain access to sensitive information. An optional internal penetration testing phase includes exploitation of the underlying vulnerabilities.
Wireless Security Reviews
Praetorian's wireless penetration testing and assessment services evaluate the security of your organization's wireless implementations and provide recommendations for improvement. An optional wireless penetration testing phase includes exploitation of the underlying vulnerabilities.
Firewall Security Reviews
Firewall security reviews are important because they identify vulnerabilities that cannot normally be detected through network penetration tests and black box network assessments.
Active Directory Reviews
Active Directory reviews are critical because of the role Active Directory plays in an environment and because the review allows us to identify vulnerabilities that cannot be detected through network testing.
External Vulnerability Assessments
Identifies and examines network vulnerabilities for external, Internet facing systems to determine whether they can be exploited by an attacker to compromise targeted systems or used to gain access to sensitive information. An optional external penetration testing phase includes exploitation of the underlying vulnerabilities.
Network Architecture Reviews
A network architecture review will evaluate the function, placement, and gaps of existing security controls and compare their alignment with the organization's security goals and objectives.
VPN Security Reviews
The VPN review compares your current configuration against recommended best practices and identifies any areas of concern. The assessment includes remote and onsite configuration review as well as an architecture review.
Mobile Device Reviews
The goal of this assessment is to identify potential holes in your organization's security posture when it comes to mobile technology.