Awesome Technologies Inc, 740 Rowlee Road, Fulton, N.Y. 13069
office (607)
562-3620
fax (315) 297-4040
toll-free (877) 411-6905
Company Service Engineering
The Awesome Technologies, Inc. – “Engineering Support Options” focus on providing onsite, task oriented support and SWAT operations for an organization. These support options help organizations to meet requirements and deadlines, while maintaining the highest level of integrity and quality.
On-site
support
Awesome Technologies, Inc. (ATI) consultants
comprise certified professionals whose experience and knowledge span
multiple technologies and best practices. With ATI’s ongoing on-site
support, organizations are able to augment their staff with
consultants that can help to drive and meet requirements and cost
objectives.
Task
Oriented Support
Health checks
The device health-check is a service in which
the ATI engineers perform a detailed analysis of devices and
application’s configuration and security. The purpose of the
Health-Check is to verify the stability and optimal functionality of
the device and application. This review is implemented in two (2)
phases:
This is an important service, since devices and/or applications that are improperly configured or patched may cause numerous network vulnerabilities and throughput issues.
The components of the review include, but are not limited to:
Dial-Up/Remote
Access Service Testing
An assessment of the dial-in/RAS settings
allows ATI to identify and exploit the analog connections and
authentication methods for remote access. The objective of this type
of review is to ensure that only authorized access from remote
dial-up is provided to confidential information. The dial-up review
is conducted in two (2) phases:
We will review the configurations of these systems to ensure that the remote access environment is secure. Certain remote access software, if poorly configured, can provide back door access that circumvents any security controls that may exist in the network infrastructure.
Internet
Penetration Testing
To test the overall adequacy of the security
surrounding the Internet Point of presence infrastructure, ATI
performs an external penetration test of targeted servers from the
Internet.
Our external security audit methodology tests an organizations’ Internet point of presence systems for known security vulnerabilities and determines the extent to which it is vulnerable to an external attack. This type of security audit allows for a quick and efficient assessment of the security of information obtainable outside of an organization’s controlled infrastructure. It focuses on the possibility of an unauthorized user from outside of the organization to exploit known network and system vulnerabilities.
Internal Risk
Assessment
ATI’s internal risk assessment service is
conducted as a node on the internal network. Our testing will
document the security exposure of the various systems as it pertains
to the organization’s business. The primary focus of this assessment
is to limit the exposure of these systems in the event an
unauthorized individual is able to circumvent the security and
controls of your perimeter Internet control devices (e.g. your
firewall and exterior filtering router) or gain physical access to
the platform.
During the course of this analysis, the ATI team will conduct a number of different functions. These include, but are not limited to:
Our analysis will utilize various internally developed custom tools and analysis techniques. These are complemented through the use of commercial security software from a variety of vendors since these tools afford us the ability to scan each host for over 2000 known vulnerabilities.
Application Level
Assessment
The application level testing assessment
consists of a detailed review of the application security
architecture and it’s relation to the overall computing
infrastructure. Our review will focus on analyzing the security
layers that are implemented to manage and control the overall
application environment.
The analysis will entail interviews with relevant employees, a review of existing supporting documentation and a comparison to leading practices. Our emphasis in reviewing application security is on ensuring the confidentiality, availability and integrity of content served by the application. Our review methodology includes a multi-step process for assessing application security configuration and operating system items. This phase of the review will focus on:
PBX Vulnerability
Assessment
The PBX vulnerability assessment service
offering by ATI helps to identify all poor configurations, open
voice mail boxes, and dead circuits within a corporate PBX system.
Most of these issues and vulnerabilities occur due to complexity of
maintaining and operating a PBX system, as well as the ever changing
flow of employees and department changes. These audits, can not only
protect the company PBX, but also ensure that the PBX is being
utilized in the most cost-effective manner.
Business
Continuity Development
Most organizations would be devastated if their
connections with their customers and/or partners were interrupted
for any length of time. Awesome Technologies, Inc., business
continuity service provides a recovery plan designed to provide
immediate response and subsequent recovery from any unplanned
business interruption, such as a loss of utility service, or
catastrophic event such as a major fire. The development of a plan
requires specific details for strategies and proposed actions
necessary to rapidly and effectively recover business operations
following an unplanned business interruption.
Technical Writing
and Documentation
The ATI team is not only about engineering a
solution, but about documenting it as well. Our staff consists of
highly skilled and proficient technical writers that have published
numerous technical documents, study guides, training material, and
whitepapers. Utilizing their technical writing skills, our
engineering staff will carefully document each step and process
involved in a design, so that a complete solution can be delivered
to the customer.
“SWAT”
Team
The Awesome Technologies, Inc. “SWAT” Team is
at your disposal when a compromised network imperils your
mission-critical applications. The ATI “SWAT” Team is comprised of
an elite core of architects and engineers who are focused on
recovering your network and stabilizing your production application
environment. After resolving the issues, the “SWAT” Team provides a
post-mortem detailing what went wrong, as well as recommendations in
the form of a disaster mitigation exercise to ensure future network
continuity and non-repeat occurrences. A key component of most
businesses, of yesterday and today, is to successfully learn from
mistakes, not fall prey to them again!
***Please do not forget that a health check is normally enough to isolate issues before they become business threatening EMERGENCIES and a job for a “SWAT” Team!!!