SITE MAP
 
     Site Map
     
Security Solutions

SoftwareUnlimited is now part of Altius Information Technologies, Inc. and proud to offer leading networking, security, and risk management services.

Network Security

Please wait while we direct you to Altius IT's industry leading network security and risk management services.  If you aren't automatically redirected, please click here.

SoftwareUnlimited provides the following security protection services for your network.  

Communications

  • Authentication

  • Dial-in management

  • General encryption

  • Remote access and control

Firewalls and Gateways

  • General rules, packet filters

  • Proxies, proxy servers

  • Topologies, DMZ

  • Virtual Private Networking (VPN)

  • Firewall limitations

Intruder Management

  • Denial of service
  • Discovering and reporting intruder
  • Legal issues
Network Issues
  • Mail servers
  • Security settings
  • Physical security
  • Policies & configuration
  • Passwords
  • System logging
  • Internet protocols
  • System backups
  • Anti-virus
  • Employee restrictions
  • Spyware

Security Resources

 

"We didn't want our employees to have access to our accounting data.  SoftwareUnlimited reviewed our systems, made some minor changes, and gave us peace of mind."  FH, Controller

 

Security Assessments
SoftwareUnlimited provides security vulnerability assessments to help you manage your security related risks.  Our unique four-step process helps identify your internal and external threats:

Discovery - we discover your network devices (routers, switches, firewalls, intruder detection systems, servers, desktop systems, etc.) using techniques such as port scanning and inverse mapping.

Identity - our engineers identify your hosts and gather type and version, publicly accessible services and applications, network identification such as IP and DNS information, and role of the device within the infrastructure. We determine what services and applications have potential vulnerabilities.

Penetration - using information collected in the Discovery and Identity steps, we use both automated and manual methods to  exploit vulnerabilities.  We take advantage of network and application configuration errors, unapplied patches, and weaknesses in authentication and firewall systems.  Our engineers elevate our access to the highest levels possible.

Reporting - we analyze the information collected and assemble relevant information into our Security Vulnerability Assessment Report.  We help you manage your risks by prioritizing vulnerabilities into high, medium and low classifications.  

Once your vulnerabilities have been identified, we'll help you eliminate these risks. Contact us to find out how we can help you protect your systems through Security Assessments and Security Policies.

"We thought we were secure.  SoftwareUnlimited's engineers found vulnerabilities before the hackers did.  SoftwareUnlimited performs a vulnerability assessment for us on a quarterly basis." JS, IT Director

Firewall Security
Firewalls are a good first step in protecting your organization from hackers.  However, they do have limitations.  SoftwareUnlimited offers a full line of security services:SonicWall firewall Contact us to find out how we can help you minimize your security risks.

"A hacker broke in and erased our firewall log files. We called SoftwareUnlimited and they configured our firewall to save the log files to our server where they are backed up to tape. We now have an audit trail should someone attempt to break in again." TD, VP Research & Development

Business Continuity (Disaster Recovery)
A member of the Association of Contingency Planners, SoftwareUnlimited provides training and disaster recovery consulting services. 
  • Criticality Review - we review your systems, staff and procedures to help identify and prioritize critical areas.  Downtime duration is a major factor in determining criticality.

  • Plan Preparation - we use cost effective industry standard templates to quickly get a plan a place.  The plan is customized according to your unique environment.

  • Plan Testing - we participate and lead you through a test of your plan to ensure people and systems are functioning as expected.  Exceptions are noted to enhance your plan and better prepare for a disaster recovery situation.

  • Disaster Recovery Consulting - we provide peace of mind by guiding you through this complex process.

Contact us for more information about our business continuity services.

"Having a disaster recovery manual was always a low priority.  SoftwareUnlimited came in and provided us with a complete manual and a successful test at a hot site." PL, IT Director



Copyright 2016, SoftwareUnlimited. All rights reserved. (714) 794-5210.