Core secure networks technology is our specialty and
our full service range includes all ancillary technical
and professional services to do with IT Security and networks.
Our experience includes design, development and support
of secure networks and infrastructures that include mid-range
and enterprise level installations.
is a primary goal. Turnkey systems can be constructed
with fully developed support models and superior documentation.
All phases of secure services development can be audited
for certification from functional requirements to operational
Operational support models that include local and remote
monitoring and notification - up to 24 hours a day and
365 days a year. We can integrate with existing business
and operational support models both technically and
from a policy perspective.
- Access control
- Cross Certification of Entrust PKIs
- Directory shadowing and chaining
- Disaster recovery and business resumption planning,
implementation, auditing and testing
- High Availability solutions or HA
- Intrusion Detection Services or IDS
- Open source solutions
- Operating system security hardening
- Penetration Testing
- Privilege management
- Product evaluation / compatibility testing
- Public Key Infrastructure or PKI
- Quality Assurance or QA testing
- Secure Remote Access or SRA
- Security audits
- Service Level Agreement or SLA compliance reports
- Threat &Risk Assessments or TRA
- Virtual Private Networks or VPN
- Vulnerability assessments
Copyright © Byward Network Security Inc., 2003-2007. All Rights Reserved.