ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Services?DataSheet
WHAT???
How?confident?are?you?that?your?wireless?network?can?withstand?the?latest?attacks?by?hackers??
Do?you?really?know?WHERE?YOUR?WEAKNESSES are??
                                                                                                       ABOUT?AXOSS
Beyond?the?authorized?wireless?infrastructure?you?know?exists?in your?organization,?what?about?
the?wireless?networks?that?aren¡¯t?supposed?to?be?there??                                               Axoss?is?a?vendor?independent?
Do?you?know?when?an?onsite?vendor?or?consulting?company?tucked?away?in?a?forgotten?                    Information?Security?Consulting?firm?
                                                                                                       that?delivers?Security?Assessment?
conference?room?plugs?in?their?mobile?access?point??
                                                                                                       Services?across?the?public?and?private?
What?about?that?temporary?access?point?in?a?QA?lab?that?is?still there?months?later??                  sectors.

WIRELESS?VULNERABILITY?ASSESSMENT?is?a?test?of?wireless?network?environment?to?assess?                 Axoss?was?founded?by?information?
security.                                                                                              security?experts,?to?provide?top?of?line?
                                                                                                       Security?Consulting?Services?that?
                                                                                                       tailored?to?meet?our?clients'?needs.

                                                                                                       Axoss?core?services?can?be?broken?
                                                                                                       down?into?four?categories:
WHY??                                                                                                  ? Penetration?Testing
                                                                                                       ? Vulnerability?Assessment
WIRELESS networking?is?one?of?the?most?POPULAR?and?fastest?growing?TECHNOLOGIES on?the?                ? Security?Consulting
market?today.?As?many?organizations?deploy?wireless??networks?as EXTENSIONS?to?their?                  ? Security?Training
existing?network,?the?THREAT?FROM?WIRELESS vulnerabilities?is?frequently?misrepresented,?
misunderstood,?or?often?simply?ignored.?The?rapid?spread?of?wireless?technologies?among?both?          Axoss?has?in©\depth?knowledge?of?the?
business?and?personal?systems?has?improved?interoperability?and?accessibility.?However,?this?          challenges?faced?by?many?
very?ubiquity?has?also?led?to?an?INCREASE in?the?number?of?threats?to?computer?networks.?              organizations?in?protecting?users,?
Wireless?technologies?have?given?attackers?new?ways?to?STEAL?SENSITIVE information,?tamper?            networks?and?critical?business?
with?business?processes,?and?subvert?network?security?enforcement?mechanisms.?                         information?from?malicious?attack?or?
                                                                                                       theft.?

                                                                                                       We?always?aim?to?deliver?scalable?
                                                                                                       solutions?so?that?every?company,?
                                                                                                       whatever?their?security?budget,?can?
                                                                                                       continue?to?enjoy?access?to?our?
WHEN??                                                                                                 expertise.
Some?of?organizations?that?house?sensitive?information?may?have?a?corporate?policy?stating?
that?wireless?LANs?are?NOT?ALLOWED.?They?may?think?that?this?¡°NO©\USE¡± POLICY keeps?their?              http://www.axoss.com
networks?safe?and?secure,?but?they?are?gravely?mistaken.?A?ROGUE?ACCESS?POINT could?be?
placed?on?their?network?by?intruders?or?by?employees,?and?without?a?WIRELESS?INTRUSION
detection?system,?there?would?be?no?way?to?know?that?all?of?their?security?mechanisms?have?
been?BYPASSED?©\ giving?full?access?to?anyone?within?300?feet?of?the?facility.?

WIRELESS?VULNERABILITY?ASSESSMENTS should?be?done?on?a?PERIODIC basis?to?ensure?that?
the?security?posture?of?the?wireless?network?remain?secure?and?identify?any?threats?facing?the?
networks.?Because?ATTACKS and?environments?are?CONTINUALLY?CHANGING,?a?through?
assessment?schedule?should?be?implemented?by?network?management.




                  All?contents?are?Copyright?? 2008?Axoss?Information?Security.?All?rights?reserved.
                                              Axoss?Public?Information.
WHERE??
AXOSS has?extensive?EXPERIENCE helping?clients?identify?access?points?and?rogue?devices,?
ANALYZE their?security?configurations,?test?for?vulnerabilities,?and?IMPLEMENT security?policies?      ABOUT?AXOSS
that?minimize?this?risk.?
                                                                                                       Axoss?is?a?vendor?independent?
Axoss?Wireless?Vulnerability?Assessment?Service?can?help?your?organization:                            Information?Security?Consulting?firm?
          ? locate?and?IDENTIFY?broadcasting?wireless?network?devices                                  that?delivers?Security?Assessment?
          ? DETERMINE the?security?of?selected?devices?through?hands?on?review?and?wireless?           Services?across?the?public?and?private?
          "sniffing"?techniques                                                                        sectors.
          ? ENSURE?wireless?configuration?adequately?PROTECTS information?assets?and?does?
                                                                                                       Axoss?was?founded?by?information?
          not?introduce?vulnerabilities?into?the?environment                                           security?experts,?to?provide?top?of?line?
          ? TEST?the?operational?EFFECTIVENESS?of?security?policiesand?procedures?                     Security?Consulting?Services?that?
                                                                                                       tailored?to?meet?our?clients'?needs.

                                                                                                       Axoss?core?services?can?be?broken?
                                                                                                       down?into?four?categories:
HOW??                                                                                                  ? Penetration?Testing
AXOSS uses?a?variety?of?public?and?proprietary?TOOLS to?ASSESS your?wireless?infrastructure.?          ? Vulnerability?Assessment
These?tools?allow?us?to?SURVEY the?airwaves?for?Access?Points?and?clients?using?802.11a/b/g?           ? Security?Consulting
                                                                                                       ? Security?Training
frequencies.?Axoss?Wireless?Security?Assessment?APPROACH is?specially?tailored?to?your?
environment?so?we?can?assess?the?true?vulnerability?of?your?wireless?infrastructure.?Using?this?       Axoss?has?in©\depth?knowledge?of?the?
approach,?we?can?MAXIMIZE your?investment?in?wireless?security,?lower?your?liability?and?              challenges?faced?by?many?
increase?data?CONF?DENT?ALITY.                                                                         organizations?in?protecting?users,?
                                                                                                       networks?and?critical?business?
Axoss?PERFORMS Wireless?Vulnerability?Assessment?following?the?OSSTMM?Wireless Security?               information?from?malicious?attack?or?
Testing?METHODOLOGY.?Axoss?Wireless??Vulnerability?Assessment?PROCESS involves                         theft.?
          ? IDENTIFY access?points?and?rogue?devices
          ? ANALYZE security?configurations                                                            We?always?aim?to?deliver?scalable?
                                                                                                       solutions?so?that?every?company,?
          ? TEST for?vulnerabilities
                                                                                                       whatever?their?security?budget,?can?
                                                                                                       continue?to?enjoy?access?to?our?
When?testing?is?complete?customers?receive?a?DETAILED?REPORT of?how?and?where?your?                    expertise.
wireless?network?is?vulnerable?to?attack?along?with?EXPERT?ADVICE on?how?to?eliminate?these?
vulnerabilities.?Axoss?DELIVERS a?complete?report?containing:                                          http://www.axoss.com
            ? EXECUTIVE Summary
            ? TECHNICAL Report
            ? Solutions?RECOMMENDATION Report




WHO??
AXOSS has?been?delivering?Information?Security?CONSULTING services?to?help?clients?
MITIGATE risk,?secure?their?infrastructure?and?PROTECT their?assets. We?are?FOCUSED on?
IMMEDIATE vulnerabilities?and?overarching?DESIGN?PROBLEMS relating?to?poor?segregation?of?
networks?and?WEAK?ENCRYPTION to?assist?organizations?in?attaining?a?hardened?wireless?
deployment.

We?welcome?any?questions?or?requests?you?may?have?about?our?Wireless?Vulnerability?
Assessments?service.?Please?don't?hesitate?to?CONTACT?US and?one?of?our?consultants?will?get?
back?to?you?as?soon?as?possible.




                  All?contents?are?Copyright?? 2008?Axoss?Information?Security.?All?rights?reserved.
                                              Axoss?Public?Information.

More Related Content

Axoss Wireless Vulnerability Assessment Services

  • 2. WHAT??? How?confident?are?you?that?your?wireless?network?can?withstand?the?latest?attacks?by?hackers?? Do?you?really?know?WHERE?YOUR?WEAKNESSES are?? ABOUT?AXOSS Beyond?the?authorized?wireless?infrastructure?you?know?exists?in your?organization,?what?about? the?wireless?networks?that?aren¡¯t?supposed?to?be?there?? Axoss?is?a?vendor?independent? Do?you?know?when?an?onsite?vendor?or?consulting?company?tucked?away?in?a?forgotten? Information?Security?Consulting?firm? that?delivers?Security?Assessment? conference?room?plugs?in?their?mobile?access?point?? Services?across?the?public?and?private? What?about?that?temporary?access?point?in?a?QA?lab?that?is?still there?months?later?? sectors. WIRELESS?VULNERABILITY?ASSESSMENT?is?a?test?of?wireless?network?environment?to?assess? Axoss?was?founded?by?information? security. security?experts,?to?provide?top?of?line? Security?Consulting?Services?that? tailored?to?meet?our?clients'?needs. Axoss?core?services?can?be?broken? down?into?four?categories: WHY?? ? Penetration?Testing ? Vulnerability?Assessment WIRELESS networking?is?one?of?the?most?POPULAR?and?fastest?growing?TECHNOLOGIES on?the? ? Security?Consulting market?today.?As?many?organizations?deploy?wireless??networks?as EXTENSIONS?to?their? ? Security?Training existing?network,?the?THREAT?FROM?WIRELESS vulnerabilities?is?frequently?misrepresented,? misunderstood,?or?often?simply?ignored.?The?rapid?spread?of?wireless?technologies?among?both? Axoss?has?in©\depth?knowledge?of?the? business?and?personal?systems?has?improved?interoperability?and?accessibility.?However,?this? challenges?faced?by?many? very?ubiquity?has?also?led?to?an?INCREASE in?the?number?of?threats?to?computer?networks.? organizations?in?protecting?users,? Wireless?technologies?have?given?attackers?new?ways?to?STEAL?SENSITIVE information,?tamper? networks?and?critical?business? with?business?processes,?and?subvert?network?security?enforcement?mechanisms.? information?from?malicious?attack?or? theft.? We?always?aim?to?deliver?scalable? solutions?so?that?every?company,? whatever?their?security?budget,?can? continue?to?enjoy?access?to?our? WHEN?? expertise. Some?of?organizations?that?house?sensitive?information?may?have?a?corporate?policy?stating? that?wireless?LANs?are?NOT?ALLOWED.?They?may?think?that?this?¡°NO©\USE¡± POLICY keeps?their? http://www.axoss.com networks?safe?and?secure,?but?they?are?gravely?mistaken.?A?ROGUE?ACCESS?POINT could?be? placed?on?their?network?by?intruders?or?by?employees,?and?without?a?WIRELESS?INTRUSION detection?system,?there?would?be?no?way?to?know?that?all?of?their?security?mechanisms?have? been?BYPASSED?©\ giving?full?access?to?anyone?within?300?feet?of?the?facility.? WIRELESS?VULNERABILITY?ASSESSMENTS should?be?done?on?a?PERIODIC basis?to?ensure?that? the?security?posture?of?the?wireless?network?remain?secure?and?identify?any?threats?facing?the? networks.?Because?ATTACKS and?environments?are?CONTINUALLY?CHANGING,?a?through? assessment?schedule?should?be?implemented?by?network?management. All?contents?are?Copyright?? 2008?Axoss?Information?Security.?All?rights?reserved. Axoss?Public?Information.
  • 3. WHERE?? AXOSS has?extensive?EXPERIENCE helping?clients?identify?access?points?and?rogue?devices,? ANALYZE their?security?configurations,?test?for?vulnerabilities,?and?IMPLEMENT security?policies? ABOUT?AXOSS that?minimize?this?risk.? Axoss?is?a?vendor?independent? Axoss?Wireless?Vulnerability?Assessment?Service?can?help?your?organization: Information?Security?Consulting?firm? ? locate?and?IDENTIFY?broadcasting?wireless?network?devices that?delivers?Security?Assessment? ? DETERMINE the?security?of?selected?devices?through?hands?on?review?and?wireless? Services?across?the?public?and?private? "sniffing"?techniques sectors. ? ENSURE?wireless?configuration?adequately?PROTECTS information?assets?and?does? Axoss?was?founded?by?information? not?introduce?vulnerabilities?into?the?environment security?experts,?to?provide?top?of?line? ? TEST?the?operational?EFFECTIVENESS?of?security?policiesand?procedures? Security?Consulting?Services?that? tailored?to?meet?our?clients'?needs. Axoss?core?services?can?be?broken? down?into?four?categories: HOW?? ? Penetration?Testing AXOSS uses?a?variety?of?public?and?proprietary?TOOLS to?ASSESS your?wireless?infrastructure.? ? Vulnerability?Assessment These?tools?allow?us?to?SURVEY the?airwaves?for?Access?Points?and?clients?using?802.11a/b/g? ? Security?Consulting ? Security?Training frequencies.?Axoss?Wireless?Security?Assessment?APPROACH is?specially?tailored?to?your? environment?so?we?can?assess?the?true?vulnerability?of?your?wireless?infrastructure.?Using?this? Axoss?has?in©\depth?knowledge?of?the? approach,?we?can?MAXIMIZE your?investment?in?wireless?security,?lower?your?liability?and? challenges?faced?by?many? increase?data?CONF?DENT?ALITY. organizations?in?protecting?users,? networks?and?critical?business? Axoss?PERFORMS Wireless?Vulnerability?Assessment?following?the?OSSTMM?Wireless Security? information?from?malicious?attack?or? Testing?METHODOLOGY.?Axoss?Wireless??Vulnerability?Assessment?PROCESS involves theft.? ? IDENTIFY access?points?and?rogue?devices ? ANALYZE security?configurations We?always?aim?to?deliver?scalable? solutions?so?that?every?company,? ? TEST for?vulnerabilities whatever?their?security?budget,?can? continue?to?enjoy?access?to?our? When?testing?is?complete?customers?receive?a?DETAILED?REPORT of?how?and?where?your? expertise. wireless?network?is?vulnerable?to?attack?along?with?EXPERT?ADVICE on?how?to?eliminate?these? vulnerabilities.?Axoss?DELIVERS a?complete?report?containing: http://www.axoss.com ? EXECUTIVE Summary ? TECHNICAL Report ? Solutions?RECOMMENDATION Report WHO?? AXOSS has?been?delivering?Information?Security?CONSULTING services?to?help?clients? MITIGATE risk,?secure?their?infrastructure?and?PROTECT their?assets. We?are?FOCUSED on? IMMEDIATE vulnerabilities?and?overarching?DESIGN?PROBLEMS relating?to?poor?segregation?of? networks?and?WEAK?ENCRYPTION to?assist?organizations?in?attaining?a?hardened?wireless? deployment. We?welcome?any?questions?or?requests?you?may?have?about?our?Wireless?Vulnerability? Assessments?service.?Please?don't?hesitate?to?CONTACT?US and?one?of?our?consultants?will?get? back?to?you?as?soon?as?possible. All?contents?are?Copyright?? 2008?Axoss?Information?Security.?All?rights?reserved. Axoss?Public?Information.