Security Solutions

Businesses are increasingly becoming more security minded as the potential of a breach becomes more costly.  BTS, Inc provides expertise in network and computer system security.  Our specialists understand that security is more than firewalls and access control, and provide services that integrate people and process into the security solutions that we provide.  One of the greatest challenges faced today as a business is finding the balance between security and accessibility.   For example, if a system is too secure then it can negatively impact the productivity of the employee and cause the business to lose money.  BTS, Inc offers a variety of services related to security and brings in expertise from all areas of computing to provide a team of individuals who present a unique approach to security.

Security Auditing

Security auditing provides your business with detailed information on the security status of your systems.  BTS, Inc analyzes systems and your network for vulnerable systems.   This audit can be customized to include internal or external vulnerability.  Internal audits analyze the computers, servers, and network as they are visible from a potential malicious user inside the company’s network.

External audits analyze the services and systems accessible from the Internet, and also analyze the perimeter defense that is in place.  At the end of the audit BTS, Inc provides a detailed report as well as recommendations on actions that can be taken to harden system security.

Attack Prevention

Intrusion Detection System (IDS )

IDS systems provide your business with a perimeter defense system that alerts administrators to potential attacks which allows administrators to proactively protect their IT systems malicious hackers and users.

“Honeypot” Systems

Honeypot’s provide a bare bones system that presents itself as a vulnerable server which can be placed on your network and monitor for attacks.  This provides valuable information on who has gained access to your systems and what their intentions are.

Network Access Control (NACL)

NACL provides control for rogue devices on your network, whether it is an employee who brings their laptop in from home or a malicious hacker installing a device on your system unknown to system administrators.  NACL can permit, deny or provide limited access to your network and systems based on policies created by the administrators.

Security Policies

BTS, Inc can create security policies customized for your systems.  These policies can range from acceptable use to corporate data protection policies.  BTS, Inc also provides consulting services to work with existing IT staff to create a policy that is effective for your specific systems.

System Security Hardening

BTS, Inc can analyze your server environment and recommend various configuration changes or possibly even new security systems designed to create a secure environment to protect your data and maintain the desired level of availability.  Our security specialists analyze business goals and match security needs to business needs.  BTS, Inc security specialists find the appropriate balance of security vs. accessibility.

Attack Migration

Security  Incident and Disaster Recovery Plans

This is part of the disaster recovery solutions offered by BTS, Inc.  Security breaches are considered disasters and have specific needs compared to other types of disasters.  BTS, Inc provides your business with a disaster recovery plan that is specific for this type of disaster, and can also work side by side with existing IT staff to create a plan suited for your systems.

Damage Assessment ‘s

In the event of an attack, BTS, Inc can assess the damage of the breach, examine your systems to determine if the attacker left a trail, and also determine how the attacker was able to compromise the system.  Our specialists provide a complete report on the state of company data as well as any malicious applications left behind by the attacker.  Recommendations are also made after determining the point of entry on what can be done to prevent further attack and protect against further damage.