Intel Security

Infrastructure Security

Keep your IT infrastructure healthy with security checkups

Our Services

Cloud Computing Readiness Check

Design, implement, and assess your cloud solutions, ensuring that security provided by your cloud vendor meets your security requirements.

Cloud Computing Security Assessment

Evaluate the security of your cloud-based solution by easing the transition to cloud-based services and assuring customers and business partners that your cloud solution is secure.

External Assessment

Identify network vulnerabilities with the greatest risk to your enterprise.

Firewall Security Assessment

Keep intruders out. Our detailed firewall analysis guards against misconfigurations, poor policies, and faulty deployment architectures to protect your most critical assets.

FoundSecure Program

 

The FoundSecure program affirms the security posture of leading organizations. The FoundSecure Seal is awarded to those organizations that have undergone a detailed Foundstone assessment, mitigated their identified exposures to security risks, and continue to proactively support and maintain their security posture.

Host Security Configuration Assessment

Protect critical servers. We evaluate server security, verify defenses for operating systems and devices, and identify vulnerabilities that cannot be detected through network assessments.

Internal Assessment

Secure internal network infrastructure by testing potential points of attack and identifying vulnerabilities that pose the greatest risk to your enterprise.

IPTV Security Assessment

Secure your IPTV technology from spam, content theft, and hackers, and comply with industry best practices.

Mobile Security Assessment

Uncover mobile vulnerabilities by identifying improperly secured mobile devices to guard against unauthorized access to your corporate network.

Modem Security Assessment

Minimize remote access risk by identifying insecure modems, analyzing security configurations, and reviewing policies that reduce risk.

Network Architecture Assessment

Improve your security foundation by evaluating the security of your network architecture to identify all vulnerabilities and keep intruders away from critical assets.

Physical Security Assessment

Align physical security with your overall risk management strategy. Our team performs physical facilities inspections, and analyzes threats and exposures to boost security and fortify business continuity planning.

Secure Virtualization Implementation Services

Secure your virtual infrastructure by uncovering vulnerabilities that present risks, and boost compliance with industry best practices.

Social Engineering

Safeguard information systems from exploitation. Our customized tests evaluate the human element in protecting critical data.

Virtual Infrastructure Security Assessment

Uncover security vulnerabilities in your virtual infrastructure by evaluating the architecture, configuration, and management of your virtualized environment to identify gaps with industry best practices and lower risk.

VoIP Security Assessment

Address VoIP security risks and meet compliance requirements.

VPN Security Assessment

Keep hackers off your VPN and ensure true end-to-end security to safeguard your critical internal network.

Wireless Network Security Assessment

Boost wireless network security and evaluate access points, seek out weak security controls and rogue devices, and implement security policies that minimize wireless risks.

Our Methodology

Foundstone consultants follow a tried, tested, and proven methodology to successfully assess your infrastructure security. By protecting the right assets from the right threats with the right measures, we achieve the highest levels of assurance and business value for our clients.