Infrastructure Assessments

Keep your IT infrastructure healthy with security checkups

McAfee Foundstone consultants follow a tried, tested, and proven methodology to conduct superior infrastructure security assessments. By protecting the right assets from the right threats with the right measures, we achieve the highest levels of assurance and business value for our clients.

Protecting critical assets from the most severe threats begins with securing all devices connected to your network. Foundstone security consultants identify and thoroughly test potential points of attack after enumerating every live host, open port, and available service. We then attempt to identify all vulnerabilities and focus on areas where a compromise would have the greatest impact and highest risk to your business. We also understand the policies and regulations that drive the need for security, especially for e-commerce and financial services. Our analysis is not disruptive to your organization, and causes minimal or no impact on staff and business productivity.

Cloud Computing Readiness Check

McAfee Foundstone’s Cloud Computing Readiness Check designs, implements, and assesses cloud solutions, ensuring that security provided by the cloud vendor meets your security requirements.

Cloud Computing Security Assessment

Evaluate the security of your cloud-based solution. McAfee Foundstone’s Cloud Computing Security Assessment eases the transition to cloud-based services and assures your customers and business partners that your cloud solution is secure.

External Assessment

Identify network vulnerabilities with the greatest risk to your enterprise.

Firewall Security Assessment

Keep intruders out. Foundstone's detailed firewall analysis guards against misconfigurations, poor policies, and faulty deployment architectures to protect your most critical assets.

Host Security Configuration Assessment

Protect critical servers. Foundstone evaluates the security of servers, verifying defenses for operating systems and devices, and identifying vulnerabilities that cannot be detected through network assessments.

Internal Assessment

Secure internal network infrastructure. Foundstone tests potential points of attack and identifies vulnerabilities with the greatest risk to your enterprise.

IPTV Security Assessment

Secure your IPTV technology from spam, content theft, and hackers, and comply with industry best practices.

Mobile Security Assessment

Uncover mobile vulnerabilities. Foundstone analysis identifies improperly secured mobile devices to guard against unauthorized access to your corporate network.

Modem Security Assessment

Minimize remote access risk. Foundstone identifies insecure modems, analyzes security configurations, and reviews policies that reduce risk.

Network Architecture Assessment

Improve your security foundation. Foundstone evaluates the security of your network architecture to identify all vulnerabilities and keep intruders away from critical assets.

Physical Security Assessment

Align physical security with your overall risk management strategy. Foundstone performs physical inspections of facilities and analyzes threats and exposures, boosting security and fortifying business continuity planning.

Secure Virtualization Implementation Services

Secure your virtual infrastructure. Foundstone uncovers vulnerabilities that present risks to your virtual infrastructure and boosts compliance with industry best practices.

Social Engineering

Safeguard information systems from exploitation. Foundstone's customized tests evaluate the human element in protecting critical data.

Virtual Infrastructure Security Assessment

Uncover security vulnerabilities in your virtual infrastructure. Foundstone evaluates the architecture, configuration, and management of your virtualized environment to identify gaps with industry best practices and lower risk.

VoIP Security Assessment

Address VoIP security risks and meet compliance requirements.

VPN Security Assessment

Keep hackers off your Virtual Private Network. Foundstone ensures true end-to-end security to safeguard your critical internal network.

Wireless Network Security Assessment

Boost wireless network security. Foundstone evaluates access points, seeks out weak security controls and rogue devices, and implements security policies that minimize wireless risks.

Next Steps
  • Frequently Asked Questions
  • RFP Template
    Foundstone has developed this Request for Proposal ("RFP") template to help organizations identify and select a quality security vendor to perform professional services work.