Powering Networks for Convergence images of networking
Home Company Profile Services and Solutions Our Customers Our Partners Affiliations and Certifications Contact Us
Services & Solutions:
  Cabling Systems
  Professional Services 
  and Support
  Wireless Networking
  Network Integration 
  IP Telephony 
  Network Security
  Outsourcing Services
  and Support
  Carrier Services 
  and Support
 
  Move, Add, 
  and Change
  
  Get a Quote  


Network Security

An insecure network is an invitation to compromise and abuse by internal and external security threats. While a completely invulnerable network cannot exist, there are some steps that can be taken to secure most existing networks. Comm-Tract can analyze your network and suggest ways to reduce the risk and enticement of attack.

After your network has been buttressed against possible immediate attacks, it’s time to develop a network security policy to ensure continuous protection. The point is that no organization can afford to be run without ground rules. Comm-Tract will turn your company’s trust in its people into rules that allow appropriate degrees of access to the information infrastructure. A solid network security policy will promote organization-wide patterns of behavior that will limit access to the network resources only to those originally intended.

After a well-thought strategy has been crafted, Comm-Tract can help with the implementation. This could also include ensuring your up-to-date conformance to the latest security norms and installation of security patches. You can remain confident in your organization’s ability to keep up with security threats while keeping your network connected to the outside world. With our Network Support Services you protect your investment in information resources and maintain the peace of mind necessary to perform your real job. 


Basic Services Include . . .

HIPAAcheck
HIPAAcheck is a packaged solution providing the end user an action plan to start on the road towards HIPAA compliance, including a security gap analysis and vulnerability assessment. HIPAAcheck security assessments are designed to help healthcare organizations maintain confidentiality, integrity, and availability of their data systems.
HIPAAcheck Overview


SECUREcheck
SECUREcheck is a packaged solution for high-level internal and external network security assessment. Through the SECUREcheck process, the Pro Shop experts thoroughly scan and inspect the customer’s network to find and report known security vulnerabilities. SECUREcheck Overview
SECUREcheck Sales Slick (click file/save as to save document)


NETcheck
NETcheck offers a network assessment of a customer’s existing network. NETcheck determines current operating parameters and provides recommendations for improving performance and planning for future growth.

NETcheck Overview
NETcheck Sales Slick (click file/save as to save document)


 HIPAAcheck

Do you need to be HIPAA compliant? HIPAA
Health Insurance Portability & Accountability Act
Requires the healthcare industry to protect the privacy of patient records. It's also designed to promote a national, uniform standard for the secure electronic transmission of patient-identifiable information.
Why Sell HIPAAcheck?Healthcare providers will need to address privacy protection and data security. Without it, they can face:

  • Non- Compliance Will Result in Civil and Criminal Penalties. Deadline: April 14th, 2003

  • Fines up to $25,000 for Multiple Violations in the Same Calendar Year.

  • Fines up to $250,000 And/or Imprisonment up to 10 Years for Knowing Misuse of Individually Identifiable Health Information.
    Covered Entities Have Two Full Years to Comply With the Final Rule's Provisions.

HIPAAcheck Is a Gap Analysis and Security Vulnerability Assessment for Health Care Providers Data Networks.HIPAAcheck Consist of a Fixed Price Base Professional Service Package with Clearly Defined Deliverables.

Extended Services Are Available and Priced Separately. 

What is a Security Vulnerability Assessment ?

...passively examining a network, and it’s assets, from an internal and external perspective, with the intent of discovering security voids or weaknesses.

These weaknesses could potentially be exploited, causing loss of data or resources to the client. The SECUREcheck Vulnerability Assessment will provide your customer with a snapshot of current security risks. 

Eligible Devices for Assessment:

Eligible Servers
Eligible Servers
Windows
Apple
Solaris
Windows 2000
Macintosh
Linux
Windows NT
 
HP/UX
Windows 98
 
AIX
Windows 95
 
BSD
 
TRU64

 

Eligible Firewalls
Cisco PIX
Check Point Firewall-1
Axent Raptor
Sidewinder
Any IPCHAINS based firewall

 

Eligible VPN devices
Cisco VPN concentrators

Any PPTP device


What does HIPAAcheck Include?



HIPAA Security Gap Analysis

  • Baseline inventory of systems, policy, procedure, practices and forms

  • Administrative, physical, and technical security review.

  • Review policies, procedures, process and practices relating to security and privacy.

  • Identify gaps between your customer’s current policies, procedures and systems to HIPAA requirements

 Action Report Assessment Findings and Gap Analysis Results

  • Determine impact of regulations on organization

  • Document differences between current IT policies, procedures, and systems to regulatory privacy requirements

  • Outline recommendations to bring IT policies, practices and systems into privacy compliance

  • Base plan to include – timeframe and actions
    Assistance with electronic extension form filing

Common Features
External Vulnerability Assessment

  • Scan of Open Ports and Services on Inbound Permanent Connections

  • External Client Information Enumeration - Publicly Discovered Information About Internal Network Assets

  • Remote Access Policy Review

Internal Vulnerability Assessment

- Server Vulnerability Assessment
- Firewall Policy Review
- VPN Policy Review
- Router and Switch Open Port and Services Scan
Server Vulnerability Report

- Scan of open ports and services
- Operating system patch levels
- File system permissions
- Password policy review
- Antivirus protection
- Accounting / intrusion detection log analysis review
- Authentication methods


SECUREcheck:

Who Needs Security?

  • Highlights of the "2002 Computer Crime and Security Survey" Include:
    90% of Respondents (Primarily Large Corporations and Government Agencies) Detected Computer Security Breaches Within the Last Twelve Months.

  • 44% Percent (223 Respondents) Were Willing And/or Able to Quantify Their Financial Losses. These 223 Respondents Reported $455,848,000 in Financial Losses.

  • As in Previous Years, the Most Serious Financial Losses Occurred Through Theft of Proprietary Information (26 Respondents Reported $170,827,000) and Financial Fraud (25 Respondents Reported $115,753,000).


Consider the Following… Has your customer’s security policy stayed relevant to their current business model and infrastructure?

Do your customer’s have the expertise and resources to assess their network security requirements?

How long can they afford to be down due to a breach of security?

SECUREcheck will identify most aspects of vulnerability and expose the potential areas for policy development. 

SECUREcheck Is a Security Vulnerability Assessment of a Private Data Network.

SECUREcheck Consists of a Fixed Price Base Professional Service Package with Clearly Defined Deliverables.

Extended Security Services Are Available and Priced Separately.  

What is a Security Vulnerability Assessment?

...passively examining a network, and it’s assets, from an internal and external perspective, with the intent of discovering security voids or weaknesses.

These weaknesses could potentially be exploited, causing loss of data or resources to the client. The SECUREcheck Vulnerability Assessment will provide your customer with a snapshot of current security risks. 

Eligible Devices for Assessment:

Eligible Servers
Eligible Servers
Windows
Apple
Solaris
Windows 2000
Macintosh
Linux
Windows NT
 
HP/UX
Windows 98
 
AIX
Windows 95
 
BSD
 
TRU64

 

Eligible Firewalls
Cisco PIX
Check Point Firewall-1
Axent Raptor
Sidewinder
Any IPCHAINS based firewall

 

Eligible VPN devices
Cisco VPN concentrators

Any PPTP device


What does HIPAAcheck Include?

 

Security Assessment Findings Report

External Assessment Deliverables:

  • Open ports/services with a description of the vulnerabilities of each.

  • Information discovered from publicly available sources.

  • Any weaknesses in the remote access policy.

Internal Assessment Deliverables:

  • Password weaknesses in the system. Also includes a recommendation on password policy.

  • Current backup policy and results of a recovery from the backup unit (if exists). This includes recommendations on backup policy.

  • Current authentication process for the system and recommendations for authentication.

  • Current IOS revision levels, open ports and general vulnerabilities for IOS and ports/services. This includes recommendations for tightening the security within routing and switching devices.

 External Vulnerability Assessment

  • Scan of Open Ports and Services on Inbound Permanent Connections

  • External Client Information Enumeration - Publicly Discovered Information About Internal Network Assets

  • Remote Access Policy Review

Internal Vulnerability Assessment::
- Server Vulnerability Assessment
- Firewall Policy Review
- VPN Policy Review
- Router and Switch Open Port and Services Scan

Server Vulnerability Report:
- Scan of open ports and services
- Operating system patch levels
- File system permissions
- Password policy review
- Antivirus protection
- Accounting / intrusion detection log analysis review
- Authentication methods 

SECUREcheck Extended Services

Additional Fee-based Remedial and Consulting Services Are Available. These Services May Be Purchased in Conjunction With or Independent of the Base Program. - Penetration Testing
- Enterprise Security Policy and Procedure Assessment
- Physical Security Assessment
- Web Site Vulnerability Assessment
- Custom Service
- On-demand Dial Service Assessment
- Application Vulnerability Assessment


 NETcheck:

NETcheck Includes:

  • Examines and documents all network hardware
    covering up to 100 network devices within a single
    location.

  • Details network software inventory including network
    device software versions.

  • Collects and reviews all Network equipment
    configurations.

  • Complete documentation on Server network
    connections.

  • Collects and documents all WAN circuit information.

  • Evaluates LAN device connectivity.

  • Surveys the Network layer protocol routing.

  • Review of current network security configuration and
    Quality of Services (QoS), parameters.

  • Analyzes the current network management system
    configuration.

  • Final review or assessment conducted by a Comm-Tract CCIE.


NETcheck Assessment Findings Report:

  • Diagrams of the current physical and logical network
    topology.

  • Written analysis of current network status.

  • Documentation on current network device software-
    configurations, hardware and software inventory and
    network address plan.

  • Recommended upgrades including network hardware,
    software, and management updates, WAN/LAN
    bandwidth, and QOS implementations.