Archive for the Security Category

PacketBlackHole

PacketBlackHole

THE POWERFUL NETWORK FORENSIC TOOL RECORD AND REVEAL every information that goes in / out of your organisation. Yes, everything. PacketBlackHole (PBH) records and reveals everything that goes on in your network.  With most advance capabilities to RECORD the network traffic and cutting edge decoding techniques  to REVEAL even encrypted communication that goes on in [...]

No Comments

Web Application Security Testing

Web Application Security Testing

Newton IT Web Application Security testing service provides an in-depth technical examination of all aspects of a web application, using proven methodologies to identify all weaknesses and vulnerabilities present which might be exploited. Web application Security testing check the SQL injection, Cross site scripting, Session management, buffer overflow, X path injection, Denial of Services vulnerabilities [...]

Comments Off

Security Audit Service

Security Audit Service

Newton IT provides security audit service to identify risks within the organizaiotnal systems. Newton IT’s security audit focuses on identifying existing risks in referece to security requirements (e.g. technology, regulatons), and provides security strategy to maintain security level in the organisation. The security audit focuses on four key points, which are (1) rule, (2) tool, [...]

Comments Off

IT Audit Service

IT Audit Service

Newton IT provides IT audit service to assist the clients to meet the financial audit requirements. Information technology Audit evaluate the controls within the entity’s information technology infrastructure in conjunction with financial statement audit to get the assurance over controls  implemented and being practice for the business critical processes. IT audit service is carried out [...]

Comments Off

Device Configuration Review

Device Configuration Review

Newton IT provide configuration Review service to assess the security configuration of the devices, mis-configuration and to provide the assurance that network devices are configured as per the organisation’s security policy. Firewall Configuration Review A firewall is an integral part of any architecture. If poorly configured it can be a liability. A review of firewall configuration [...]

Comments Off

Penetration Test

Penetration Test

Penetration testing is where a professional “ethical” hacker inspects the vulnerability of your information systems from an objective view point. The difference between a traditional security audit/test and our penetration test is that we can actually test your security by using the same techniques that a real attacker would use when hacking your system. This [...]

Comments Off

Log and monitoring / analysis

Log and monitoring / analysis

What is Firewall Log Analysis? A Firewall is an important perimeter defence tool that protects your network from attacks. Security tools like Firewalls, VPN, and Proxy Servers generate a huge quantity of traffic logs, which can be mined to generate a wealth of security information reports. Why Firewall Log Analysis? Analyzing firewall traffic logs is [...]

Comments Off