SlideShare a Scribd company logo
Services DataSheet
WHAT ? 
How confident are you that your wireless network can withstand the latest attacks by hackers? 
Do you really know WHERE YOUR WEAKNESSES are? 
                                                                                                       ABOUT AXOSS
Beyond the authorized wireless infrastructure you know exists in your organization, what about 
the wireless networks that aren’t supposed to be there?                                                Axoss is a vendor independent 
Do you know when an onsite vendor or consulting company tucked away in a forgotten                     Information Security Consulting firm 
                                                                                                       that delivers Security Assessment 
conference room plugs in their mobile access point? 
                                                                                                       Services across the public and private 
What about that temporary access point in a QA lab that is still there months later?                   sectors.

WIRELESS VULNERABILITY ASSESSMENT is a test of wireless network environment to assess                  Axoss was founded by information 
security.                                                                                              security experts, to provide top of line 
                                                                                                       Security Consulting Services that 
                                                                                                       tailored to meet our clients' needs.

                                                                                                       Axoss core services can be broken 
                                                                                                       down into four categories:
WHY ?                                                                                                  • Penetration Testing
                                                                                                       • Vulnerability Assessment
WIRELESS networking is one of the most POPULAR and fastest growing TECHNOLOGIES on the                 • Security Consulting
market today. As many organizations deploy wireless  networks as EXTENSIONS to their                   • Security Training
existing network, the THREAT FROM WIRELESS vulnerabilities is frequently misrepresented, 
misunderstood, or often simply ignored. The rapid spread of wireless technologies among both           Axoss has in‐depth knowledge of the 
business and personal systems has improved interoperability and accessibility. However, this           challenges faced by many 
very ubiquity has also led to an INCREASE in the number of threats to computer networks.               organizations in protecting users, 
Wireless technologies have given attackers new ways to STEAL SENSITIVE information, tamper             networks and critical business 
with business processes, and subvert network security enforcement mechanisms.                          information from malicious attack or 
                                                                                                       theft. 

                                                                                                       We always aim to deliver scalable 
                                                                                                       solutions so that every company, 
                                                                                                       whatever their security budget, can 
                                                                                                       continue to enjoy access to our 
WHEN ?                                                                                                 expertise.
Some of organizations that house sensitive information may have a corporate policy stating 
that wireless LANs are NOT ALLOWED. They may think that this “NO‐USE” POLICY keeps their               http://www.axoss.com
networks safe and secure, but they are gravely mistaken. A ROGUE ACCESS POINT could be 
placed on their network by intruders or by employees, and without a WIRELESS INTRUSION
detection system, there would be no way to know that all of their security mechanisms have 
been BYPASSED ‐ giving full access to anyone within 300 feet of the facility. 

WIRELESS VULNERABILITY ASSESSMENTS should be done on a PERIODIC basis to ensure that 
the security posture of the wireless network remain secure and identify any threats facing the 
networks. Because ATTACKS and environments are CONTINUALLY CHANGING, a through 
assessment schedule should be implemented by network management.




                  All contents are Copyright © 2008 Axoss Information Security. All rights reserved.
                                              Axoss Public Information.
WHERE ?
AXOSS has extensive EXPERIENCE helping clients identify access points and rogue devices, 
ANALYZE their security configurations, test for vulnerabilities, and IMPLEMENT security policies       ABOUT AXOSS
that minimize this risk. 
                                                                                                       Axoss is a vendor independent 
Axoss Wireless Vulnerability Assessment Service can help your organization:                            Information Security Consulting firm 
          • locate and IDENTIFY broadcasting wireless network devices                                  that delivers Security Assessment 
          • DETERMINE the security of selected devices through hands on review and wireless            Services across the public and private 
          "sniffing" techniques                                                                        sectors.
          • ENSURE wireless configuration adequately PROTECTS information assets and does 
                                                                                                       Axoss was founded by information 
          not introduce vulnerabilities into the environment                                           security experts, to provide top of line 
          • TEST the operational EFFECTIVENESS of security policiesand procedures                      Security Consulting Services that 
                                                                                                       tailored to meet our clients' needs.

                                                                                                       Axoss core services can be broken 
                                                                                                       down into four categories:
HOW ?                                                                                                  • Penetration Testing
AXOSS uses a variety of public and proprietary TOOLS to ASSESS your wireless infrastructure.           • Vulnerability Assessment
These tools allow us to SURVEY the airwaves for Access Points and clients using 802.11a/b/g            • Security Consulting
                                                                                                       • Security Training
frequencies. Axoss Wireless Security Assessment APPROACH is specially tailored to your 
environment so we can assess the true vulnerability of your wireless infrastructure. Using this        Axoss has in‐depth knowledge of the 
approach, we can MAXIMIZE your investment in wireless security, lower your liability and               challenges faced by many 
increase data CONFİDENTİALITY.                                                                         organizations in protecting users, 
                                                                                                       networks and critical business 
Axoss PERFORMS Wireless Vulnerability Assessment following the OSSTMM Wireless Security                information from malicious attack or 
Testing METHODOLOGY. Axoss Wireless  Vulnerability Assessment PROCESS involves                         theft. 
          • IDENTIFY access points and rogue devices
          • ANALYZE security configurations                                                            We always aim to deliver scalable 
                                                                                                       solutions so that every company, 
          • TEST for vulnerabilities
                                                                                                       whatever their security budget, can 
                                                                                                       continue to enjoy access to our 
When testing is complete customers receive a DETAILED REPORT of how and where your                     expertise.
wireless network is vulnerable to attack along with EXPERT ADVICE on how to eliminate these 
vulnerabilities. Axoss DELIVERS a complete report containing:                                          http://www.axoss.com
            • EXECUTIVE Summary
            • TECHNICAL Report
            • Solutions RECOMMENDATION Report




WHO ?
AXOSS has been delivering Information Security CONSULTING services to help clients 
MITIGATE risk, secure their infrastructure and PROTECT their assets. We are FOCUSED on 
IMMEDIATE vulnerabilities and overarching DESIGN PROBLEMS relating to poor segregation of 
networks and WEAK ENCRYPTION to assist organizations in attaining a hardened wireless 
deployment.

We welcome any questions or requests you may have about our Wireless Vulnerability 
Assessments service. Please don't hesitate to CONTACT US and one of our consultants will get 
back to you as soon as possible.




                  All contents are Copyright © 2008 Axoss Information Security. All rights reserved.
                                              Axoss Public Information.

More Related Content

PDF
Axoss Wireless Penetration Testing Services
PDF
Axoss Secure Network Design Services
PDF
Axoss Network Penetration Testing Services
PDF
Axoss Security Hardening Services
PDF
Axoss Network Vulnerability Assessment Services
PPTX
From Physical to Virtual to Cloud
PPTX
Data Center Security Now and into the Future
PPTX
Defending the Data Center: Managing Users from the Edge to the Application
Axoss Wireless Penetration Testing Services
Axoss Secure Network Design Services
Axoss Network Penetration Testing Services
Axoss Security Hardening Services
Axoss Network Vulnerability Assessment Services
From Physical to Virtual to Cloud
Data Center Security Now and into the Future
Defending the Data Center: Managing Users from the Edge to the Application

What's hot (20)

PDF
Axoss Web Application Vulnerability Assessment Services
PDF
Cloud Security: Perception VS Reality
PDF
The Context Aware Network A Holistic Approach to BYOD
PPTX
Monetizing the Enterprise: Borderless Networks
PDF
Strong Authentication & SMS / skyguide Project
PPT
Refense Security Risk Briefing July 2009
PDF
Air defense services_platform_8.0_spec_sheet
PDF
Cloud Security: Perception Vs. Reality
PDF
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
PDF
OpSource Enterprise-Class Security
PDF
Why the Cloud can be Compliant and Secure
KEY
Cloudop security
PDF
NSX on VMware Data Center
PDF
St. Vincents Private Hospital Physical Security
PDF
It's 2012 and My Network Got Hacked - Omar Santos
PPTX
Kaspersky security for virtualization light agent launch presentation
PPTX
Rik Ferguson
PDF
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
PPTX
Trend micro v2
PDF
Cat6500 Praesentation
Axoss Web Application Vulnerability Assessment Services
Cloud Security: Perception VS Reality
The Context Aware Network A Holistic Approach to BYOD
Monetizing the Enterprise: Borderless Networks
Strong Authentication & SMS / skyguide Project
Refense Security Risk Briefing July 2009
Air defense services_platform_8.0_spec_sheet
Cloud Security: Perception Vs. Reality
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
OpSource Enterprise-Class Security
Why the Cloud can be Compliant and Secure
Cloudop security
NSX on VMware Data Center
St. Vincents Private Hospital Physical Security
It's 2012 and My Network Got Hacked - Omar Santos
Kaspersky security for virtualization light agent launch presentation
Rik Ferguson
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Trend micro v2
Cat6500 Praesentation
Ad

Viewers also liked (17)

PPT
Hiro Atualizado
PPTX
Keats
PDF
Casos informe las_americas
PPT
Apresentação do Artigo - Casa Apis e COCAJUPI
PPT
我的作品集
PPT
DallaFrancesca_Boella_Breve
PDF
Pete de Vere
PPTX
Get Your Tag
PDF
Projecto educativo20092013
PPTX
Strategic planning
PDF
Leclerc medicaments
DOC
Vigilence control system for train drivers
DOC
Virtual educa2013
PDF
Presentacion yucca mountain
PDF
TV Channels of the Future - AtticTV Pte Ltd
DOCX
Single axis tracker vs fixed tilt
Hiro Atualizado
Keats
Casos informe las_americas
Apresentação do Artigo - Casa Apis e COCAJUPI
我的作品集
DallaFrancesca_Boella_Breve
Pete de Vere
Get Your Tag
Projecto educativo20092013
Strategic planning
Leclerc medicaments
Vigilence control system for train drivers
Virtual educa2013
Presentacion yucca mountain
TV Channels of the Future - AtticTV Pte Ltd
Single axis tracker vs fixed tilt
Ad

Similar to Axoss Wireless Vulnerability Assessment Services (20)

PDF
Axoss Security Audit Services
PDF
Axoss Security Awareness Services
PDF
Axoss Web Application Penetration Testing Services
PDF
BigFix White Paper
PDF
What we do at Abacus
DOCX
W5 Technologies for Decision MakingGraded Discussion  Technolo.docx
PDF
Wireless Vulnerability Management: What It Means for Your Enterprise
PDF
Vulnerability assessment-info-savvy
PDF
Arrow ecs security_brochure_2012
PDF
MP_OneSheet_VulnThreat
PDF
Ergo - IT Infrastructure Overview Brochure
PDF
Progressive Times - May 2012
PDF
Massbiz Consulting Crede Sed Proba
PPTX
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
PDF
Finance customer reference booklet
PPTX
Pronet for slideshare
PDF
GBS - 8 ways to knockout network headaches
PDF
Idc cost complexitycompliance
PDF
Secure Network Administration, Inc. ProActive IT Managed Services
PPTX
Network Security Offering by GSS America
Axoss Security Audit Services
Axoss Security Awareness Services
Axoss Web Application Penetration Testing Services
BigFix White Paper
What we do at Abacus
W5 Technologies for Decision MakingGraded Discussion  Technolo.docx
Wireless Vulnerability Management: What It Means for Your Enterprise
Vulnerability assessment-info-savvy
Arrow ecs security_brochure_2012
MP_OneSheet_VulnThreat
Ergo - IT Infrastructure Overview Brochure
Progressive Times - May 2012
Massbiz Consulting Crede Sed Proba
Crafting Super-Powered Risk Assessments by Digital Defense Inc & Veracode
Finance customer reference booklet
Pronet for slideshare
GBS - 8 ways to knockout network headaches
Idc cost complexitycompliance
Secure Network Administration, Inc. ProActive IT Managed Services
Network Security Offering by GSS America

Axoss Wireless Vulnerability Assessment Services

  • 2. WHAT ?  How confident are you that your wireless network can withstand the latest attacks by hackers?  Do you really know WHERE YOUR WEAKNESSES are?  ABOUT AXOSS Beyond the authorized wireless infrastructure you know exists in your organization, what about  the wireless networks that aren’t supposed to be there?  Axoss is a vendor independent  Do you know when an onsite vendor or consulting company tucked away in a forgotten  Information Security Consulting firm  that delivers Security Assessment  conference room plugs in their mobile access point?  Services across the public and private  What about that temporary access point in a QA lab that is still there months later?  sectors. WIRELESS VULNERABILITY ASSESSMENT is a test of wireless network environment to assess  Axoss was founded by information  security. security experts, to provide top of line  Security Consulting Services that  tailored to meet our clients' needs. Axoss core services can be broken  down into four categories: WHY ? • Penetration Testing • Vulnerability Assessment WIRELESS networking is one of the most POPULAR and fastest growing TECHNOLOGIES on the  • Security Consulting market today. As many organizations deploy wireless  networks as EXTENSIONS to their  • Security Training existing network, the THREAT FROM WIRELESS vulnerabilities is frequently misrepresented,  misunderstood, or often simply ignored. The rapid spread of wireless technologies among both  Axoss has in‐depth knowledge of the  business and personal systems has improved interoperability and accessibility. However, this  challenges faced by many  very ubiquity has also led to an INCREASE in the number of threats to computer networks.  organizations in protecting users,  Wireless technologies have given attackers new ways to STEAL SENSITIVE information, tamper  networks and critical business  with business processes, and subvert network security enforcement mechanisms.  information from malicious attack or  theft.  We always aim to deliver scalable  solutions so that every company,  whatever their security budget, can  continue to enjoy access to our  WHEN ? expertise. Some of organizations that house sensitive information may have a corporate policy stating  that wireless LANs are NOT ALLOWED. They may think that this “NO‐USE” POLICY keeps their  http://www.axoss.com networks safe and secure, but they are gravely mistaken. A ROGUE ACCESS POINT could be  placed on their network by intruders or by employees, and without a WIRELESS INTRUSION detection system, there would be no way to know that all of their security mechanisms have  been BYPASSED ‐ giving full access to anyone within 300 feet of the facility.  WIRELESS VULNERABILITY ASSESSMENTS should be done on a PERIODIC basis to ensure that  the security posture of the wireless network remain secure and identify any threats facing the  networks. Because ATTACKS and environments are CONTINUALLY CHANGING, a through  assessment schedule should be implemented by network management. All contents are Copyright © 2008 Axoss Information Security. All rights reserved. Axoss Public Information.
  • 3. WHERE ? AXOSS has extensive EXPERIENCE helping clients identify access points and rogue devices,  ANALYZE their security configurations, test for vulnerabilities, and IMPLEMENT security policies  ABOUT AXOSS that minimize this risk.  Axoss is a vendor independent  Axoss Wireless Vulnerability Assessment Service can help your organization: Information Security Consulting firm  • locate and IDENTIFY broadcasting wireless network devices that delivers Security Assessment  • DETERMINE the security of selected devices through hands on review and wireless  Services across the public and private  "sniffing" techniques sectors. • ENSURE wireless configuration adequately PROTECTS information assets and does  Axoss was founded by information  not introduce vulnerabilities into the environment security experts, to provide top of line  • TEST the operational EFFECTIVENESS of security policiesand procedures  Security Consulting Services that  tailored to meet our clients' needs. Axoss core services can be broken  down into four categories: HOW ? • Penetration Testing AXOSS uses a variety of public and proprietary TOOLS to ASSESS your wireless infrastructure.  • Vulnerability Assessment These tools allow us to SURVEY the airwaves for Access Points and clients using 802.11a/b/g  • Security Consulting • Security Training frequencies. Axoss Wireless Security Assessment APPROACH is specially tailored to your  environment so we can assess the true vulnerability of your wireless infrastructure. Using this  Axoss has in‐depth knowledge of the  approach, we can MAXIMIZE your investment in wireless security, lower your liability and  challenges faced by many  increase data CONFİDENTİALITY. organizations in protecting users,  networks and critical business  Axoss PERFORMS Wireless Vulnerability Assessment following the OSSTMM Wireless Security  information from malicious attack or  Testing METHODOLOGY. Axoss Wireless  Vulnerability Assessment PROCESS involves theft.  • IDENTIFY access points and rogue devices • ANALYZE security configurations We always aim to deliver scalable  solutions so that every company,  • TEST for vulnerabilities whatever their security budget, can  continue to enjoy access to our  When testing is complete customers receive a DETAILED REPORT of how and where your  expertise. wireless network is vulnerable to attack along with EXPERT ADVICE on how to eliminate these  vulnerabilities. Axoss DELIVERS a complete report containing: http://www.axoss.com • EXECUTIVE Summary • TECHNICAL Report • Solutions RECOMMENDATION Report WHO ? AXOSS has been delivering Information Security CONSULTING services to help clients  MITIGATE risk, secure their infrastructure and PROTECT their assets. We are FOCUSED on  IMMEDIATE vulnerabilities and overarching DESIGN PROBLEMS relating to poor segregation of  networks and WEAK ENCRYPTION to assist organizations in attaining a hardened wireless  deployment. We welcome any questions or requests you may have about our Wireless Vulnerability  Assessments service. Please don't hesitate to CONTACT US and one of our consultants will get  back to you as soon as possible. All contents are Copyright © 2008 Axoss Information Security. All rights reserved. Axoss Public Information.