Vulnerability analysis provides a careful review of the specific risks your installation faces from outside threats. We can review your configuration, your connection to the Internet and your existing defenses.
We will use a variety of standard utilities, customized scanners, and exploitation tools to test your Internet connection, firewall, and boundary network in an exercise to determine whether your installation is susceptible to these attacks. After the exercise we will examine audit logs with you, review alarms generated by the test, and offer configuration and procedural recommendations for reducing risks in your Internet connectivity. For maximum benefit we recommend that this task be combined with a security survey. For more information on vulnerability analysis, please contact us
Telecom and Logistics Associates has staff with expertise in many aspects of computer and communications security, ranging from network connections to cryptography and from implementation of security solutions to secure files storage or e-mail. We have provided training to groups in private industry, on topics such as threats, vulnerabilities and countermeasures; Internet security concepts; and secure site design. We will present courses tailored to your security needs and concerns, for either management or technical audiences. For more information on training, please contact us
A security consultant from Telecom and Logistics Associates will visit your organization for a day to discuss your unique security requirements. Before the visit we will jointly develop an agenda for the activities of the day. Each of these consulting activities is unique, but for other customers we have:
reviewed configurations and suggested alternatives, proposed solutions to particular problems, answered questions on different issues in information security, and made presentations on specified topics.
Telecom and Logistics Associates(bureau d'Ingénieurs Christian ALT) has performed consulting for a variety of customers since its beginning in 1991. Our satisfied customer list includes diverse organizations such as banks and financial institutions, communications providers, and industrial groups and organizations. We are prepared to assist on a wide range of topics, such as network and Internet security, encryption, electronic commerce, and secure design and operation.
For more information on either of these consulting activities, please contact