Syrinx Technologies offers a comprehensive array of systems and network security services. Clients choose the specific services they need and then a scope of work is written based on the particular services requested. This helps control costs by committing the client only to the specific services needed. The following is a brief overview of these services:
The purpose of a penetration test is to simulate an attacker attempting to gain unauthorized access to a network resource. The attack could occur from the outside or the inside of the security perimeter. It could come from an employee, customer, competitor or anonymous Internet user. The testing can be performed from an external or internal perspective, or both. This testing includes dial-in, wireless and social engineering assessments. Download this PDF for information on the testing methodology used by Syrinx Technologies.
Syrinx Technologies can offer consulting assistance to organizations working towards PCI compliance. While Syrinx Technologies is not a QSA or ASV, it can offer consulting in many phases of the process. It can also help by offering penetration scanning which satisfies Rule 11.3 for both internal and external testing. Syrinx Technologies has created a "cheat sheet" with information on "who, what and when" regarding PCI. Download the PDF here.
eHealthSecurity was born out of the passion for protecting health-related information. Bryan Miller, President of Syrinx Technologies started this concept after performing security audits on a variety of healthcare-related organizations. While he encourages concepts such as the NHIN and EHR/EMRs, he strongly believes that securing each individual organization must come first.
Lost and stolen laptops have become a major issue for organizations with a mobile workforce. Rarely a week goes by without a major incident involving laptops and sensitive data. The costs of thes incidents can be measured in real dollars and the organizations reputation. Syrinx Technologies has developed a service offering where it will test the security of a laptop in order to help an organization develop a secure model for laptop builds. The goal is to develop procedures for building new, secure laptops in the future.
All facets of the security controls provided by the laptop will be tested and attempts to leverage any information found on the laptop will be performed. The only requirement is that a laptop be provided in the same condition and with all peripheral devices as it would appear during an actual theft. Syrinx Technologies will analyze the security controls and produce a report detailing attempts to bypass the security controls and provide recommendations for improving the security posture for the laptop. Statistics show that one in 10 laptops will be stolen. Don’t wait until your organization becomes another statistic. Download this PDF for more information and service specifics.