Other Services

Other Services  

A recent CERT study of 250 insider threat cases revealed 68% of employees or contractors stole intellectual property within three weeks of announcing their departure, with 50% having the intent to sell.

Vulnerability Scanning

Vulnerability scanning is used to evaluate the security posture of either an individual asset (such as a single computer, router, or mobile device) or multiple assets comprised into a network. Taranet can provide a comprehensive general Vulnerability Scanning Report of your security posture or a report based off a particular industry compliance (i.e., HIPAA, GLBA, SOX, etc.) Information included in these reports can include unsecure configuration information, missing operating system patches, missing application patches or upgrade information, open ports as well as security bulletins where a solution hasn’t been yet implemented or determined.

Penetration Testing

It’s important to understand the security posture of your information system and identify any vulnerability. Taranet can conduct a penetration test to reveal where your security investment should be allocated. With the use of a Penetration Test, we can identify issues that would normally only be identified in the event of a system breach and after your information system has been compromised.