Armored Car Enterprises - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Armored Car Enterprises

Description:

Armored Car Enterprises. Adam Wilkins-Administration Specialist. Anne Youdath ... FOUNDED IN 2002, ARMORED CAR ENTERPRISES (ACE) is a firm that provides financial ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 14
Provided by: chrisc56
Category:

less

Transcript and Presenter's Notes

Title: Armored Car Enterprises


1
Armored Car Enterprises
  • Adam Wilkins-Administration Specialist
  • Anne Youdath-Marketing/Financial Specialist
  • Chris Coffaro-Information Specialist
  • Matt Hollar-Speaker of the House
  • Paige Kindell-Web Design Specialist

2
Company Background
  • FOUNDED IN 2002, ARMORED CAR ENTERPRISES (ACE)
    is a firm that provides financial institutions
    with background information and guidance on
    various risk assessment tools and practices
  • related to information security, focusing on
    online transactions.

3
Market Focus
  • Our primary focus is on a variety of financial
    institutions.
  • Regional banks
  • Local banks and credit unions
  • Possible expansion to brokerage firms

4
Market Characteristics
  • How banks operate
  • Invest both individual and corporate holdings
  • Loan money to customers
  • Services
  • Charge for checks
  • Monthly fees
  • Notary services
  • Credit card transactions

5
Customer Needs
  • A secure internal/external network that will
    allow safe transfer of data.
  • A secure website that will allow customers online
    transactions to remain confidential

6
Methodology
  • Investigate

7
ACE Services
  • ACE's Security Assessment Services include the
    following
  • Web Site Health Checks
  • Penetration Testing
  • Firewall Auditing

8
Web Site Health Checks
  • Deliverables
  • The vulnerabilities in your web server
  • Which ports are open and what applications are
    running on those ports
  • Which CGI scripts are insecure and contain flaws

9
Web Site Health Checks Cont
  • How easy it is for hackers to identify your
    operating system
  • How easy it is to steal a TCP session on your web
    server

10
Penetration Testing
  • Deliverables
  • Problems found, including the risk and likelihood
    of users/hackers exploiting them
  • Recommendations for fixing or applying
    workarounds to these flaws
  • Possible causes of the vulnerabilities
  • Recommendations for preventing in the future.

11
Firewall Auditing
  • Deliverables
  • A detailed analysis of the current firewall load,
    traffic and security incidents
  • Alerts / critical events
  • Warnings
  • Unusual or excessive bandwidth usage

12
Firewall Auditing Cont
  • Breakdown of web, e-mail, FTP, telnet activity
  • Remote management
  • Internal and external addresses that trigger
    firewall rules

13
Why choose us?
  • One-on-one personable consulting team
  • Needs based
  • Fresh ideas that offer the most creative and
    innovative solutions for your needs
Write a Comment
User Comments (0)
About PowerShow.com