Corporate

Home

Clients

Contact Us

Services

IBM RS/6000

2105 "Shark" SAN

AIX

Linux

TSM

HACMP

Other Products

 

Web Applications

SAP Basis

Oracle

 

Disaster Recovery

Monitoring/Notification

Security

Outsourcing

Miscellaneous

Printable Brochure

Links

                          

 

Security

  • Analyze AIX environment from security perspective.
  • Simulate "hacker" attacks and document security exposures.
  • Identify security breaches.
  • Eliminate security holes.
  • Implement software and procedures to minimize security risks.
  • Implement tools and methodologies to minimize the requirement for "root" account usage.
 
 

Home

RS/6000 | AIX | Linux  | TSM | HACMP | SAP  | Oracle  | Web Apps  
 Disaster Recovery | Outsourcing | Security  
 Clients | Employment Opportunities
Links | Contact Us