CertainKey - Services - Server Auditing

By: Certainkey  09-12-2011
Keywords: Security, Mailing List

Some companies ignore IT security.

Some companies make major strides towards security, then get complacent, comforted by a false sense of security.

And some companies stay abreast of new network threats with CertainKey 's automated security audits.

Certain Key maintains its CertainAudit scanning engine much like antivirus software vendors maintain their virus engines - by watching what is happening in the real world and monitoring attacks at key sites, and updating the detection engine accordingly.

The CertainAudit engine then periodically "attacks" your network, much like an ethical hacker might. The difference here is repetition and knowledge. The CertainKey auditing can be performed at the frequency you specify - daily, weekly, or monthly. The engine is carefully maintained and updated continually to help detect areas of concern; it learns faster than your average hacker. With nearly 15,000 vulnerbilities to check for, CertainAudit is your security watch dog.

At the end of each audit, a is e-mailed to you, showing what was tested and how your network withstood the attacks. You get a simple list marked in green (OK), orange (weakness), and red (vulnerability), helping you prioritize changes. Furthermore, CertainKey 's security gurus are only a phone call away to help explain the results and recommend actions.


Get yours today!

Achieve low-cost peace of mind through tight network security. And never be afraid of an audit again.

Affordable monthly maintenance of Linux servers is also available.

*CertainKey is not responsible for false positives or false negatives in our reports, they are provided as a guide and aid to help you secure your own site. CertainKey is also not responsible for any damages or liabilities that may occur to the server we test during or after our scans.

For more information about these and other products or services
  • Subscribe to our mailing list to receive updates, security news, and get access to free software!

Keywords: Mailing List, Security

Other products and services from Certainkey


CertainKey - Products - GreyWire

CertainKey's GreyWire technology eliminates the need for expensive trunk lines by bridging two or more networks over a high-speed 128bit AES encrypted wireless connection. Connecting two high-speed networks - such as two offices across town from each other - is traditionally an expensive task. MAC address preservation (invisible to your existing network devices. Certain Key GreyWire - Simple Transparent Powerful.


CertainKey - Products - Gatekeeper

CertainKey Gatekeeper's security features integrate with Microsoft Windows and other applications to provide impenetrable protection in an easy to use fashion. With CertainKeyGatekeeper, your email is always stored in protected form, decrypted on-demand by your favorite email reader. Utilizing Internet standards, CertainKey Gatekeeper integrates seamlessly with most platforms, browsers and mail clients.


CertainKey - Products

Securing confidential business information is necessary but most often not done because many products are cumbersome and time consuming. Having to go out of your way to do the encrypt/decrypt process guarantees that files will go unencrypted and left vulnerable. Our Gatekeeper application integrates with your installed applications and. High-speed truly secure wireless networking.


CertainKey - Services - Release Control

Think of CertainRelease as a portable bank vault: you don't mind the information getting there early, but you want to make sure that it cannot be opened or tampered with until a pre-defined time. It sends out an encrypted e-mail with attachments long before the event, and uses several common techniques to make sure that it gets delivered.


CertainKey - Services

Similarly, in the online world, CertainKey's CertainRelease service offers the guarantees that e-mail can't offer: secure, precisely timed, and guaranteed delivery. Every time a new exploit is discovered in the community, CertainKey staff immediately update the CertainAudit scanning engine. Audits are repeated periodically, and security reports are e-mailed with clear indicators of weaknesses and holes.