314-596-8750 - First 5 minutes FREE
Security Solutions

INTEK Consulting Services' team of highly trained security experts helps your enterprise assess, protect against, detect, and respond to security threats from within or outside the enterprise.
Data Sheet

Assessment
Security Assessment — Quickly identifies immediate security concerns and network weaknesses, and then uses this information as the foundation for a comprehensive network review.
Penetration Testing — Uses a multi-phased process of penetration testing and access attempts to assess the type and extent of security-related vulnerabilities that may exist in your current security system.

Protection and Detection
Security Policy Design — Translates an enterprise's existing security requirements into a documented security standard to ensure that information assets are protected throughout the network.
Firewall Protection — Safeguards entry to an enterprise's network with a special security system that prevents external hackers from misusing Internet connections and dial-in lines.
Authentication — Leverages extensive authentication methodologies to verify that electronic messages come from their stated sources.
Remote Access and Virtual Private Networks (VPNs) — Deploys and maintains the VPN to ensure that only authorized users can access the network. Uses sophisticated encryption technologies to encode data and prevent unintended recipients from capitalizing on it.
Intrusion Detection — Utilizes advanced detection technology to scan for firewall "holes" and immediately detect and neutralize hacker attempts.
Virus and Malicious Code Protection — Architects sophisticated protection mechanisms so that viruses and malicious code—which can be disguised as benign data such as e-mail—cannot penetrate your network.

Response
Incident Response — Works closely with your security team during a security-related event to provide an immediate analysis and a prompt, measured response.
Incident Response Policy — Helps an enterprise rapidly recover lost or damaged data in the event of internal or external sabotage, or resource or information misuse.
Process Improvement — Creates a customized response procedure to contain, remedy, or halt any security or performance infringement. Analyzes current operations and trains your staff to deal with any computer-related crisis.