SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Services DataSheet
WHAT ? 
How confident are you that your wireless network can withstand the latest attacks by hackers? 
Do you really know WHERE YOUR WEAKNESSES are? 
                                                                                                       ABOUT AXOSS
Beyond the authorized wireless infrastructure you know exists in your organization, what about 
the wireless networks that aren’t supposed to be there?                                                Axoss is a vendor independent 
Do you know when an onsite vendor or consulting company tucked away in a forgotten                     Information Security Consulting firm 
                                                                                                       that delivers Security Assessment 
conference room plugs in their mobile access point? 
                                                                                                       Services across the public and private 
What about that temporary access point in a QA lab that is still there months later?                   sectors.

WIRELESS VULNERABILITY ASSESSMENT is a test of wireless network environment to assess                  Axoss was founded by information 
security.                                                                                              security experts, to provide top of line 
                                                                                                       Security Consulting Services that 
                                                                                                       tailored to meet our clients' needs.

                                                                                                       Axoss core services can be broken 
                                                                                                       down into four categories:
WHY ?                                                                                                  • Penetration Testing
                                                                                                       • Vulnerability Assessment
WIRELESS networking is one of the most POPULAR and fastest growing TECHNOLOGIES on the                 • Security Consulting
market today. As many organizations deploy wireless  networks as EXTENSIONS to their                   • Security Training
existing network, the THREAT FROM WIRELESS vulnerabilities is frequently misrepresented, 
misunderstood, or often simply ignored. The rapid spread of wireless technologies among both           Axoss has in‐depth knowledge of the 
business and personal systems has improved interoperability and accessibility. However, this           challenges faced by many 
very ubiquity has also led to an INCREASE in the number of threats to computer networks.               organizations in protecting users, 
Wireless technologies have given attackers new ways to STEAL SENSITIVE information, tamper             networks and critical business 
with business processes, and subvert network security enforcement mechanisms.                          information from malicious attack or 
                                                                                                       theft. 

                                                                                                       We always aim to deliver scalable 
                                                                                                       solutions so that every company, 
                                                                                                       whatever their security budget, can 
                                                                                                       continue to enjoy access to our 
WHEN ?                                                                                                 expertise.
Some of organizations that house sensitive information may have a corporate policy stating 
that wireless LANs are NOT ALLOWED. They may think that this “NO‐USE” POLICY keeps their               http://www.axoss.com
networks safe and secure, but they are gravely mistaken. A ROGUE ACCESS POINT could be 
placed on their network by intruders or by employees, and without a WIRELESS INTRUSION
detection system, there would be no way to know that all of their security mechanisms have 
been BYPASSED ‐ giving full access to anyone within 300 feet of the facility. 

WIRELESS VULNERABILITY ASSESSMENTS should be done on a PERIODIC basis to ensure that 
the security posture of the wireless network remain secure and identify any threats facing the 
networks. Because ATTACKS and environments are CONTINUALLY CHANGING, a through 
assessment schedule should be implemented by network management.




                  All contents are Copyright © 2008 Axoss Information Security. All rights reserved.
                                              Axoss Public Information.
WHERE ?
AXOSS has extensive EXPERIENCE helping clients identify access points and rogue devices, 
ANALYZE their security configurations, test for vulnerabilities, and IMPLEMENT security policies       ABOUT AXOSS
that minimize this risk. 
                                                                                                       Axoss is a vendor independent 
Axoss Wireless Vulnerability Assessment Service can help your organization:                            Information Security Consulting firm 
          • locate and IDENTIFY broadcasting wireless network devices                                  that delivers Security Assessment 
          • DETERMINE the security of selected devices through hands on review and wireless            Services across the public and private 
          "sniffing" techniques                                                                        sectors.
          • ENSURE wireless configuration adequately PROTECTS information assets and does 
                                                                                                       Axoss was founded by information 
          not introduce vulnerabilities into the environment                                           security experts, to provide top of line 
          • TEST the operational EFFECTIVENESS of security policiesand procedures                      Security Consulting Services that 
                                                                                                       tailored to meet our clients' needs.

                                                                                                       Axoss core services can be broken 
                                                                                                       down into four categories:
HOW ?                                                                                                  • Penetration Testing
AXOSS uses a variety of public and proprietary TOOLS to ASSESS your wireless infrastructure.           • Vulnerability Assessment
These tools allow us to SURVEY the airwaves for Access Points and clients using 802.11a/b/g            • Security Consulting
                                                                                                       • Security Training
frequencies. Axoss Wireless Security Assessment APPROACH is specially tailored to your 
environment so we can assess the true vulnerability of your wireless infrastructure. Using this        Axoss has in‐depth knowledge of the 
approach, we can MAXIMIZE your investment in wireless security, lower your liability and               challenges faced by many 
increase data CONFİDENTİALITY.                                                                         organizations in protecting users, 
                                                                                                       networks and critical business 
Axoss PERFORMS Wireless Vulnerability Assessment following the OSSTMM Wireless Security                information from malicious attack or 
Testing METHODOLOGY. Axoss Wireless  Vulnerability Assessment PROCESS involves                         theft. 
          • IDENTIFY access points and rogue devices
          • ANALYZE security configurations                                                            We always aim to deliver scalable 
                                                                                                       solutions so that every company, 
          • TEST for vulnerabilities
                                                                                                       whatever their security budget, can 
                                                                                                       continue to enjoy access to our 
When testing is complete customers receive a DETAILED REPORT of how and where your                     expertise.
wireless network is vulnerable to attack along with EXPERT ADVICE on how to eliminate these 
vulnerabilities. Axoss DELIVERS a complete report containing:                                          http://www.axoss.com
            • EXECUTIVE Summary
            • TECHNICAL Report
            • Solutions RECOMMENDATION Report




WHO ?
AXOSS has been delivering Information Security CONSULTING services to help clients 
MITIGATE risk, secure their infrastructure and PROTECT their assets. We are FOCUSED on 
IMMEDIATE vulnerabilities and overarching DESIGN PROBLEMS relating to poor segregation of 
networks and WEAK ENCRYPTION to assist organizations in attaining a hardened wireless 
deployment.

We welcome any questions or requests you may have about our Wireless Vulnerability 
Assessments service. Please don't hesitate to CONTACT US and one of our consultants will get 
back to you as soon as possible.




                  All contents are Copyright © 2008 Axoss Information Security. All rights reserved.
                                              Axoss Public Information.

Weitere ähnliche Inhalte

Was ist angesagt?

Axoss Web Application Vulnerability Assessment Services
Axoss Web Application Vulnerability Assessment ServicesAxoss Web Application Vulnerability Assessment Services
Axoss Web Application Vulnerability Assessment ServicesBulent Buyukkahraman
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODCisco Canada
 
Strong Authentication & SMS / skyguide Project
Strong Authentication & SMS / skyguide ProjectStrong Authentication & SMS / skyguide Project
Strong Authentication & SMS / skyguide ProjectSylvain Maret
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAdvantec Distribution
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Skybox Security
 
OpSource Enterprise-Class Security
OpSource Enterprise-Class Security OpSource Enterprise-Class Security
OpSource Enterprise-Class Security OpSource
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureInnoTech
 
Cloudop security
Cloudop securityCloudop security
Cloudop securitywardspan
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentationShapeBlue
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...NetworkCollaborators
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 

Was ist angesagt? (20)

Axoss Web Application Vulnerability Assessment Services
Axoss Web Application Vulnerability Assessment ServicesAxoss Web Application Vulnerability Assessment Services
Axoss Web Application Vulnerability Assessment Services
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Strong Authentication & SMS / skyguide Project
Strong Authentication & SMS / skyguide ProjectStrong Authentication & SMS / skyguide Project
Strong Authentication & SMS / skyguide Project
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheet
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
 
OpSource Enterprise-Class Security
OpSource Enterprise-Class Security OpSource Enterprise-Class Security
OpSource Enterprise-Class Security
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
Cloudop security
Cloudop securityCloudop security
Cloudop security
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 

Andere mochten auch

Apresentação do Artigo - Casa Apis e COCAJUPI
Apresentação do Artigo - Casa Apis e COCAJUPIApresentação do Artigo - Casa Apis e COCAJUPI
Apresentação do Artigo - Casa Apis e COCAJUPIAislan Rafael
 
我的作品集
我的作品集我的作品集
我的作品集Lydia Lin
 
Strategic planning
Strategic planningStrategic planning
Strategic planningBill Taylor
 
Leclerc medicaments
Leclerc medicamentsLeclerc medicaments
Leclerc medicamentsNGAUTHE
 
Vigilence control system for train drivers
Vigilence control system for train driversVigilence control system for train drivers
Vigilence control system for train driversvamshi24
 
Virtual educa2013
Virtual educa2013Virtual educa2013
Virtual educa2013arellys16
 
Presentacion yucca mountain
Presentacion yucca mountainPresentacion yucca mountain
Presentacion yucca mountainMirian Quinteros
 
TV Channels of the Future - AtticTV Pte Ltd
TV Channels of the Future - AtticTV Pte LtdTV Channels of the Future - AtticTV Pte Ltd
TV Channels of the Future - AtticTV Pte LtdJohnson Goh
 
Single axis tracker vs fixed tilt
Single axis tracker vs fixed tiltSingle axis tracker vs fixed tilt
Single axis tracker vs fixed tiltDominic A Fernando
 

Andere mochten auch (17)

Hiro Atualizado
Hiro AtualizadoHiro Atualizado
Hiro Atualizado
 
Keats
KeatsKeats
Keats
 
Casos informe las_americas
Casos informe las_americasCasos informe las_americas
Casos informe las_americas
 
Apresentação do Artigo - Casa Apis e COCAJUPI
Apresentação do Artigo - Casa Apis e COCAJUPIApresentação do Artigo - Casa Apis e COCAJUPI
Apresentação do Artigo - Casa Apis e COCAJUPI
 
我的作品集
我的作品集我的作品集
我的作品集
 
DallaFrancesca_Boella_Breve
DallaFrancesca_Boella_BreveDallaFrancesca_Boella_Breve
DallaFrancesca_Boella_Breve
 
Pete de Vere
Pete de VerePete de Vere
Pete de Vere
 
Get Your Tag
Get Your TagGet Your Tag
Get Your Tag
 
Projecto educativo20092013
Projecto educativo20092013Projecto educativo20092013
Projecto educativo20092013
 
Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Leclerc medicaments
Leclerc medicamentsLeclerc medicaments
Leclerc medicaments
 
Vigilence control system for train drivers
Vigilence control system for train driversVigilence control system for train drivers
Vigilence control system for train drivers
 
Tema 3
Tema 3Tema 3
Tema 3
 
Virtual educa2013
Virtual educa2013Virtual educa2013
Virtual educa2013
 
Presentacion yucca mountain
Presentacion yucca mountainPresentacion yucca mountain
Presentacion yucca mountain
 
TV Channels of the Future - AtticTV Pte Ltd
TV Channels of the Future - AtticTV Pte LtdTV Channels of the Future - AtticTV Pte Ltd
TV Channels of the Future - AtticTV Pte Ltd
 
Single axis tracker vs fixed tilt
Single axis tracker vs fixed tiltSingle axis tracker vs fixed tilt
Single axis tracker vs fixed tilt
 

Ähnlich wie Wireless Vulnerability Assessment DataSheet

Axoss Web Application Penetration Testing Services
Axoss Web Application Penetration Testing ServicesAxoss Web Application Penetration Testing Services
Axoss Web Application Penetration Testing ServicesBulent Buyukkahraman
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3CCG
 
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfAnto664537
 
Cisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdfCisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdfServerTours
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at AbacusNovember014
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hostingwebhostingguy
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questionsShivamSharma909
 

Ähnlich wie Wireless Vulnerability Assessment DataSheet (20)

Axoss Web Application Penetration Testing Services
Axoss Web Application Penetration Testing ServicesAxoss Web Application Penetration Testing Services
Axoss Web Application Penetration Testing Services
 
Axoss Security Awareness Services
Axoss Security Awareness ServicesAxoss Security Awareness Services
Axoss Security Awareness Services
 
Axoss Security Audit Services
Axoss Security Audit ServicesAxoss Security Audit Services
Axoss Security Audit Services
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
SASE.pptx
SASE.pptxSASE.pptx
SASE.pptx
 
Techowl- Wazuh.pdf
Techowl- Wazuh.pdfTechowl- Wazuh.pdf
Techowl- Wazuh.pdf
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
 
Cisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdfCisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdf
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at Abacus
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hosting
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
Top SASE (Secure Access Service Edge) Vendors of 2024
Top SASE (Secure Access Service Edge) Vendors of 2024Top SASE (Secure Access Service Edge) Vendors of 2024
Top SASE (Secure Access Service Edge) Vendors of 2024
 

Wireless Vulnerability Assessment DataSheet

  • 2. WHAT ?  How confident are you that your wireless network can withstand the latest attacks by hackers?  Do you really know WHERE YOUR WEAKNESSES are?  ABOUT AXOSS Beyond the authorized wireless infrastructure you know exists in your organization, what about  the wireless networks that aren’t supposed to be there?  Axoss is a vendor independent  Do you know when an onsite vendor or consulting company tucked away in a forgotten  Information Security Consulting firm  that delivers Security Assessment  conference room plugs in their mobile access point?  Services across the public and private  What about that temporary access point in a QA lab that is still there months later?  sectors. WIRELESS VULNERABILITY ASSESSMENT is a test of wireless network environment to assess  Axoss was founded by information  security. security experts, to provide top of line  Security Consulting Services that  tailored to meet our clients' needs. Axoss core services can be broken  down into four categories: WHY ? • Penetration Testing • Vulnerability Assessment WIRELESS networking is one of the most POPULAR and fastest growing TECHNOLOGIES on the  • Security Consulting market today. As many organizations deploy wireless  networks as EXTENSIONS to their  • Security Training existing network, the THREAT FROM WIRELESS vulnerabilities is frequently misrepresented,  misunderstood, or often simply ignored. The rapid spread of wireless technologies among both  Axoss has in‐depth knowledge of the  business and personal systems has improved interoperability and accessibility. However, this  challenges faced by many  very ubiquity has also led to an INCREASE in the number of threats to computer networks.  organizations in protecting users,  Wireless technologies have given attackers new ways to STEAL SENSITIVE information, tamper  networks and critical business  with business processes, and subvert network security enforcement mechanisms.  information from malicious attack or  theft.  We always aim to deliver scalable  solutions so that every company,  whatever their security budget, can  continue to enjoy access to our  WHEN ? expertise. Some of organizations that house sensitive information may have a corporate policy stating  that wireless LANs are NOT ALLOWED. They may think that this “NO‐USE” POLICY keeps their  http://www.axoss.com networks safe and secure, but they are gravely mistaken. A ROGUE ACCESS POINT could be  placed on their network by intruders or by employees, and without a WIRELESS INTRUSION detection system, there would be no way to know that all of their security mechanisms have  been BYPASSED ‐ giving full access to anyone within 300 feet of the facility.  WIRELESS VULNERABILITY ASSESSMENTS should be done on a PERIODIC basis to ensure that  the security posture of the wireless network remain secure and identify any threats facing the  networks. Because ATTACKS and environments are CONTINUALLY CHANGING, a through  assessment schedule should be implemented by network management. All contents are Copyright © 2008 Axoss Information Security. All rights reserved. Axoss Public Information.
  • 3. WHERE ? AXOSS has extensive EXPERIENCE helping clients identify access points and rogue devices,  ANALYZE their security configurations, test for vulnerabilities, and IMPLEMENT security policies  ABOUT AXOSS that minimize this risk.  Axoss is a vendor independent  Axoss Wireless Vulnerability Assessment Service can help your organization: Information Security Consulting firm  • locate and IDENTIFY broadcasting wireless network devices that delivers Security Assessment  • DETERMINE the security of selected devices through hands on review and wireless  Services across the public and private  "sniffing" techniques sectors. • ENSURE wireless configuration adequately PROTECTS information assets and does  Axoss was founded by information  not introduce vulnerabilities into the environment security experts, to provide top of line  • TEST the operational EFFECTIVENESS of security policiesand procedures  Security Consulting Services that  tailored to meet our clients' needs. Axoss core services can be broken  down into four categories: HOW ? • Penetration Testing AXOSS uses a variety of public and proprietary TOOLS to ASSESS your wireless infrastructure.  • Vulnerability Assessment These tools allow us to SURVEY the airwaves for Access Points and clients using 802.11a/b/g  • Security Consulting • Security Training frequencies. Axoss Wireless Security Assessment APPROACH is specially tailored to your  environment so we can assess the true vulnerability of your wireless infrastructure. Using this  Axoss has in‐depth knowledge of the  approach, we can MAXIMIZE your investment in wireless security, lower your liability and  challenges faced by many  increase data CONFİDENTİALITY. organizations in protecting users,  networks and critical business  Axoss PERFORMS Wireless Vulnerability Assessment following the OSSTMM Wireless Security  information from malicious attack or  Testing METHODOLOGY. Axoss Wireless  Vulnerability Assessment PROCESS involves theft.  • IDENTIFY access points and rogue devices • ANALYZE security configurations We always aim to deliver scalable  solutions so that every company,  • TEST for vulnerabilities whatever their security budget, can  continue to enjoy access to our  When testing is complete customers receive a DETAILED REPORT of how and where your  expertise. wireless network is vulnerable to attack along with EXPERT ADVICE on how to eliminate these  vulnerabilities. Axoss DELIVERS a complete report containing: http://www.axoss.com • EXECUTIVE Summary • TECHNICAL Report • Solutions RECOMMENDATION Report WHO ? AXOSS has been delivering Information Security CONSULTING services to help clients  MITIGATE risk, secure their infrastructure and PROTECT their assets. We are FOCUSED on  IMMEDIATE vulnerabilities and overarching DESIGN PROBLEMS relating to poor segregation of  networks and WEAK ENCRYPTION to assist organizations in attaining a hardened wireless  deployment. We welcome any questions or requests you may have about our Wireless Vulnerability  Assessments service. Please don't hesitate to CONTACT US and one of our consultants will get  back to you as soon as possible. All contents are Copyright © 2008 Axoss Information Security. All rights reserved. Axoss Public Information.