PackerIT Solutions Corp. Information Technology and Cybersecurity Solutions
Consulting Services:
Customized consulting services include:
For smaller companies, Packer IT serves as your IT department, for larger entities we can be an extension of your IT department.
External Vulnerability Assessment (EVA):
Monthly or bi-weekly reports emailed to you in PDF or HTML format detailing vulnerabilities detected on network ports or software publicly facing the Internet - the front doors to your network. Hackers constantly scan those ports looking for a way in. We monitor those front and back doors with state-of-the-art network vulnerability assessment software and provide you with the information you need to assure that your network is secure and where your vulnerabilities lie.
Internal Vulnerability Assessment (IVA):
Monthly or bi-weekly reports emailed to you in a PDF or HTML format detailing vulnerabilities detected on network ports or software, on your internal network. Some companies think that internal vulnerabilities can be ignored because the equipment is not internet-facing. In addition to examining vulnerabilities of servers, routers, firewalls, and switches, it is important to look under the hood. Inside your network, malware and other threats can be exploiting internal vulnerabilities in order to use them to compromise data, enslave your equipment as tools for hackers, or worse. We monitor your critical systems to protect against, assess and address vulnerabilities.
Morning Check:
Sometimes, companies need an extra and independent eye on things. We compose suitable checklists for your operating environment and perform daily checks to assure that your critical systems are up and functioning. Weekday check are completed before 9AM EST so as your staff is rolling in, a status report is there to greet them and focus attention on any issues that might need immediate attention.
Secure File Transfers:
Secure File Transfers are often necessary when sharing confidential information and complying with data security compliance requirements of government agencies (e.g., HIPAA, FINRA), clients and permitted users.
We offer simple solutions for securely transferring files under those circumstances. Our solutions run on cloud-based platforms such as AWS (Amazon Web Services), Microsoft Azure, and other platforms. When combined with our security scanning solutions for your network, our customers and their clients have peace of mind and assurance you can securely handle your clients’ data management needs.
Vulnerability Security Scanning:
As with our External and Internal Vulnerability Assessment services, our security scanning solutions provide monthly or bi-weekly reports PDF or HTML formats detailing vulnerabilities detected on network ports or software, whether facing the Internet or within our customers’ internal networks. We monitor those front and back doors with state-of-the-art network vulnerability assessment software and provide you with the information you need to assure that your network is secure and where any vulnerabilities lie.
Firmware Check:
The first line of defense to cyber-intrusion often involves keeping operating versions of software and firmware current and up-to-date. Some vulnerabilities, such as out-of-date operating versions, may elude conventional intrusion testing.
For that reason, firmware used by our customers’ routers and switches must be updated and kept current to specified versions in order to be considered complaint and up to best practices of the equipment vendor. We inventory your equipment, specify operating firmware and IOS versions being used, identify vulnerabilities and recommend appropriate remediation.