logo

B-LUC Consulting

background Send us an email
bar
Home
About us

Services
Services

Secure Passwords
Generate Secure Passwords

Papers
Papers

Sitemap
Sitemap

B-LUC Consulting - What we do

  • Risk Assessments

    • Vulnerability Assessments

      Vulnerability Assessments check a network for service access and vulnerabilities which would allow an adversary to penetrate that network.
      Vulnerability Assessments come in two forms:
      • External - where we assume the adversary sits outside your network
      • Internal - where we assume that the adversary has already managed to get inside your network
      Vulnerability Assessments will produce:
      • An executive summary
      • A list of findings sorted by severity which can serve as a starting point for a remediation plan
      • A full list of findings per IP address complete with severity, references and possible remediation tactics
    • Network Security Assessments

      Network Security Assessments check security settings on network devices (e.g. firewall, router, switch, access point) against recommended standards (e.g. CIS benchmarks).
      Network Security Assessments will produce:
      • An executive summary
      • A list of findings sorted by severity which can serve as a starting point for a remediation plan
    • Server Security Assessments

      Server Security Assessments check security settings on servers (e.g. Unix, Linux, Windows) against recommended standards (e.g. CIS benchmarks).
      Server Security Assessments will produce:
      • An executive summary
      • A list of findings sorted by severity which can serve as a starting point for a remediation plan
    • Application Security Assessments

      Application Security Assessments check security settings on critical applications (e.g. database, web server) against recommended standards (e.g. CIS benchmarks).
      Application Security Assessments will produce:
      • An executive summary
      • A list of findings sorted by severity which can serve as a starting point for a remediation plan
  • Security Awareness

    Security Awareness consists of two components:
    • Training
    • Social Engineering
      Email still constitiutes the majority of attempts to gain unauthorized access.
      B-LUC Consulting offers phishing campaigns to test the awareness of your staff and management against those type of attacks.
  • Custom work

    • Setup, harden and maintain Linux and Unix servers
    • Setup, harden and maintain application servers (eg. EMail/Zimbra, Web server, Zenoss, Backup, NFS/Rsync, DNS, FTP)
    • Setup, harden and maintain custom appliances (eg. Load Balancers, IDS/IPS, Log Servers)
    • Provide custom software development in bash, perl and php