Network Security
Wolfram Reiners
about network security: "The Internet with its open architecture
has the well developed ability to connect anybody to anybody else,
but network security features have long been neglected. Today, we
know that security threats may be the severest limitation to effective
Internet usage."
Our Network Security division
offers products and services:
Training Workshops in Network
Security for your network administrators or system administrators.
Available are two consecutive training workshops on the topic of
"hacking and security".
Read more on training
workshops in network security >>
IT Security Assessment -
Penetration Test. We offer a comprehensive assessment package
of your company's IT security status. Our experienced hackers utilise
professional tools and self-developed software to do IT
penetration testing and to detect the security weaknesses in
your IT infrastructure.
Read more on IT
security assessment and penetration testing >>
ARP Guard - Protection from
Inside Attacks. External attacks by hackers, viruses, worms
and trojans are permanent threads to the network security of any
progressive company. What is not widely known, though, is that the
major portion of attacks come from within the network. Using fake
ARP
messages an attacker can divert all communication between two machines
with the result that all traffic is exchanged via his PC. Also Voice-over-IP
telephone calls (VoIP
phone calls) can be tapped by these
man-in-the-middle-attacks via ARP
spoofing attacks.
Read more on protection
from ARP attacks >>
PSOCA - Secure Online Payment.
PSOCA is an invention of how card-based payments on the
Internet can be performed in a secure and easy-to-use way. Credit
card issuing banks or payment service providers may be interested
in a licence to apply the PSOCA security mechanism for their business.
Read more on secure
online payment >>
eIntact - Internet Privacy Protection. eIntact
is an Internet security and privacy protection company. The open
architecture of the Internet both enables and invites snooping.
Data about online movements, interests, objectives, preferences
and information needs are stored and exploited by many interested
and powerful parties without the user's knowledge.
Read more on Internet
privacy protection >>
Thank you very much for your interest
in our Network Security division.
|