We offer widely proven, intelligent perimeter, internal and web security solutions.
- Anti-virus and Anti-spam Solutions
- Vulnerability Assessment and Penetration Testing
- Firewall/VPN and Perimeter Security Solution
- Intrusion Detection/Prevention Solutions
- Content Filtering and Management Software
- Internet/Web Application Security
- Email and IM Security
- Two factor Authentication Solution
- SSL VPN Solution
- Strong Encryption Solutions
- Server & Link Load Balancing and High Availability Solutions
Security Consulting Services
Assessment of Information Security Architecture
Inherent weakness and design flaws in the enterprise architecture from security perspective are detected, which can lead to compromise of confidentiality, integrity or availability of the system. The mitigation strategy is suggested. The proposed enterprise architecture is designed and delivered. Enterprise architecture is backbone of any secure information systems network. Auriga follows structure approach to security design often within the Customers existing infrastructure or by recommending additional best-of breed security components.
Vulnerability Assessment and Penetration Testing
Penetration testing and vulnerability assessment are two different and complimentary pro-active approaches to assess the security posture of the information systems networks. Penetration testing is the testing of the security posture from the hacker’s perspective, whereas the Vulnerability Assessment is done to test the security posture of the Information Systems as an internal attacker. Comprehensive methodology is recommended to fix the identified vulnerabilities.