ACG has extensive experience in Network Vulnerability Assessments and Penetration Testing. Utilizing the latest commercial tools, open source utilities, and custom proprietary tools, ACG can assist you in meeting your security testing needs.
A vulnerability assessment shows the system’s security posture with respect to specific vulnerabilities. The focus of vulnerability assessment exercises is to perform a thorough examination of the IT environment and identify the weak points. The vulnerability assessment interprets and compares results against the various business processes to determine whether the perceived vulnerability is indeed valid, is a false positive or whether other security controls address the perceived vulnerability.
Building on the valuable information gained from vulnerability assessment exercises, the goal of penetration testing is to determine if the protective controls of a given IT system can be bypassed by actively exploiting identified weaknesses. Penetration Testing provides evidence (sometimes to an unbelieving audience) that vulnerabilities indeed are exploitable. It brings a dose of reality and intense focus to the vulnerability assessment.
ACG’s consultants are all security professionals holding industry recognized certifications to include:
- Global Information Assurance Certification (GIAC) Security Leadership (GSLC)
- GIAC Exploit Researcher and Advanced Penetration Tester
(GXPN) / Certified Incident Handler (GCIH)
- ISC(2) Certified Information Systems Security Professional (CISSP)
- Certified Ethical Hacker (C|EH)
- Offensive-Security Certified Professional (OSCP)
- Certified Network Defence Architect (CNDA)
“The use of wireless internet connectivity has become important in today’s business environment in order to stay flexible and efficient. Athena Consulting Group can ensure that your wireless solution is up to date and equipped with today’s latest security implementations. ACG has the personnel and experience in the industry allowing us to offer a complete wireless security solution.
Once a wireless infrastructure has been deployed, organizations should conduct a wireless security assessment to identify any possible gaps in wireless security controls. By utilizing the most advanced hacking techniques, ACG is able to ensure that your WLAN is protected from intruders by employing the same methods and tools advanced hackers would be using to gain access. ACG’s wireless security assessment uses automated software and manual penetration techniques to locate and map authorized and unauthorized wireless access points, review corporate access point configuration, and then locate weaknesses that could allow an attacker to penetrate those networks. Potential internal and external threats are documented and a recommended action plan is developed to address any security risks.”