top of page
Abstract Sphere

Services

Security Overview | The Threat | Services |
Methodology | Free Consultation

Security Overview

OUR METHODS

VisionOnline offers security solutions that address the major problem with computer networks today:

Static defenses leave your network vulnerable to attack and exploitation. You already know the computer networks that you use to communicate, conduct business and store information are under attack. Every day new computer viruses are unleashed, hackers launch new attacks and employees try to access unauthorized information on your network. Your network, like most, probably has off-the-shelf anti-virus (AV) and firewall protection. These defenses are static – your AV only blocks viruses known at the time of your last update, and even a properly configured firewall only filters specific incoming traffic from INTERNET.

 

THE VISIONONLINE SOLUTION

VisionOnline prevents intrusions by finding the vulnerabilities in your system before an attack. Finding the vulnerabilities, figuring out which are exploitable and discovering the cure is difficult and time consuming without the proper tools and expertise. That’s why VisionOnline offers the following services that will make your network dramatically more secure:

       Vulnerability Scanning 

       Penetration Testing 

       Vulnerability Correction 

       Network Forensic Analysis 

       Dynamic AV Support 

 

WHY VISIONONLINE?

At VisionOnline, we work with you to find the right solution for your security risks and your budget. As a small business, we go that “extra mile” to get and keep your business. Instead of a one-size-fits-all approach, we take the time to carefully analyze your actual security vulnerabilities and offer creative, customized, and integrated solutions. You won’t find that kind of personalized service from the big guys. At the same time, we offer you the most up-to-date and technically advanced security solutions through our strategic partnerships.

The Threat

Your network faces the following threats, with the first threats listed being the most common:

 

1) INTERNAL THREATS

Source

• Departing employees

• Disgruntled or harassing employees

• Curious or negligent employees

• Intruders

 

Results

• Liability for employee actions, such as sexual harassment or possession of pornography

• Disclosure of Intellectual Property

• Loss of trade secret protections

• Violation of regulations such as HIPAA

• Loss of productivity due to unmonitored web surfing and personal email usage

• Unknown devices can reside on your system

 

2) COMMUNICATION THREATS

Source

• User error – emails sent to the wrong party

• Employee installation of unauthorized wireless access points or modems

• Hackers opening backdoors through email

• Man-in-the-middle alteration or interception of email

 

Results

• Loss of intellectual property

• Loss of content authenticity and source authenticity (non-reputability)

• Loss of attorney-client privilege and work product protection

• Loss of trade secret protections and violation of regulations

• You spread viruses, worms and Trojans to your clients

 

3) EXTERNAL THREATS

Source

• Former employees Hackers Competitors

 

Results

• Shutdown of your network or loss of network resources

• Worms and viruses infect you and your clients

• Liability for your system being used as a “zombie” to launch attacks on other systems

• Hackers use your system to store pornography

• Loss of client confidence

EMAIL SECURITY

E-mail has grown to become a popular means for information exchange and has become a critical communications tool between organizations and individuals. Because the rapid spread and use of e-mail has outpaced the development of effective security, it is often a “weak link” in existing email implementations. There are important e-mail security issues that should addressed, such as privacy, confidentiality, integrity and non-repudiation.

 

VisionOnline can provide you with a variety of email security solutions such as Public Key Infrastructure (PKI) based encryption solutions, which allow users to seamlessly use encrypted emails that won’t interfere with their work flow. VisionOnline also offers security solutions for business-critical distributed applications over intranets, extranets and the Internet. We offer a broad range of highly available and scalable PKI solutions for enterprises using Entrust, VeriSign, Baltimore Technologies, RSA Security and Microsoft products, among others.

 

VisionOnline can also provide you with various “appliance-based” solutions, such as the Tovaris Mithril ™ box, which provide a high degree of email security that can be deployed quickly.

VIRTUAL PRIVATE NETWORKS AND INTRUSION DETECTION SYSTEMS (IDS)

Regardless of whether your business needs client-based VPN solutions or VPN tunnels between your networks, VisionOnline can assist with the selection and implementation of cost-effective and high performance VPNs. We can also help you plan and install firewalls and IDS systems from Cisco, Symantec (formerly Raptor) and CheckPoint. We also provide managed firewall and IDS services through our partners.

ACCESS CONTROL (SINGLE SIGN ON – BIOMETRICS)

New biometrics technologies are emerging as a key component of access control. VisionOnline can help you select the most appropriate and cost-effective biometric identification and authentication method for your organization, including: fingerprint, retina, iris, facial recognition, palm scan, hand geometry, voice recognition and handwritten signature dynamics. In addition, we can provide you with access control solutions using a variety of smart card-based implementations, including SmartJava. Whether your operating environment supports Windows, NetWare, Unix or is a hybrid, VisionOnline can help your organization select and implement the best Single Sign-On (SSO) solution.

SECURE APPLICATIONS DEVELOPMENT - INCLUDING WEB SECURITY

VisionOnline’s extensive experience with software engineering lends allows us to offer a full range of secure applications development, including web development. We have expertise in C, C++, Visual Basic, Java and Power Builder and we incorporate security throughout the application development process -- from system requirements analysis to the operations and maintenance phase. Our information security experts can conduct secure programming that utilizes the latest security technologies, including access control and data encryption.

DATABASE SECURITY

VisionOnline engineers have diverse experience with Oracle, Sybase and Microsoft SQL and can provide security solutions using the latest features of these relational database products, including views, encrypted storage and advance access control. Our services mitigate vulnerabilities related to aggregation and inference of information that are especially common in data warehouse and data mining applications. We also specialize in security issues related to database management systems (DBMS).

WIRELESS SECURITY

We provide security expertise in many wireless standards including IEEE Ethernet 802.11x. Our expertise extends from basic security methods, such as Service Set Identifier (SSID), Media Access Control (MAC), address filtering and Wired Equivalent Privacy (WAP), to enhanced security based on VPN configurations, PKI and port-based network access with 802.1x. In addition, we provide security solutions and analysis for other wireless standards and services, including Cellular Digital Packet Data (CDPD), PDAs, cell phones and Bluetooth-enabled devices.

SECURITY AWARENESS AND PROFESSIONAL TRAINING

A key component of any well-structured security policy is security awareness training. Because security policies vary based on the unique characteristics of your enterprise, so too should your security awareness training program. Our partners can help develop an effective training program, as well as train employees, system administrators, developers, executives and the security staff itself.

SECURITY AWARENESS AND PROFESSIONAL TRAINING

A key component of any well-structured security policy is security awareness training. Because security policies vary based on the unique characteristics of your enterprise, so too should your security awareness training program. Our partners can help develop an effective training program, as well as train employees, system administrators, developers, executives and the security staff itself.

COMPUTER INCIDENT RESPONSE CAPABILITY (CIRC)

VisionOnline offers state-of-the-art Computer Incident Response Capability (CIRC). This capability is a combination of our extensive qualifications within the information security process and our partnership with nationwide leading providers of 24-7 incident response services. VisionOnline and our partners represent a unique and comprehensive team that provides a complete CIRC solution. This solution can include artificial intelligence based processes for continuous data collection and analysis.


An effective incident response function is critical to the success of every business — whether commercial or government. It can mean the difference between minimal network downtime and a damaged reputation or extensive financial loss. When an intrusion occurs, you need a system that stands ready to prevent further damage to your network and company operations. Everyday, our technical team will identify and respond to any such incidents as they occur on your network. Our team includes experienced technical investigators who are qualified to analyze incident data and identify the nature and source of network security breaches. This proven group also can provide short-notice response to resolve your network security incidents.

SECURITY AWARENESS AND PROFESSIONAL TRAINING

A key component of any well-structured security policy is security awareness training. Because security policies vary based on the unique characteristics of your enterprise, so too should your security awareness training program. Our partners can help develop an effective training program, as well as train employees, system administrators, developers, executives and the security staff itself.

SECURITY MONITORING, TESTING AND AUDITING

Monitoring, testing and auditing are the final key components of a well-developed security policy. VisionOnline extensively audits your system for compliance with your security policy and tests your security controls. We also provide remote monitoring (managed services) and sophisticated penetration testing through our partners.

APPLICATION SECURITY ASSESSMENT SERVICE

While we offer our risk assessment service as part of total Security Package, VisionOnline also offers this service as a convenient pre-packaged, fixed-price, stand alone security consulting service. We will give you access to one dedicated expert security design consultant, who in turn will have access to other security experts from VisionOnline to support and review specific security issues. This is a cost-effective approach to address security relate subjects and requirements for new or existing applications.

 Our assessment will aid you in making your application compliant with applicable regulations, standards and security policies (HIPAA, DITSCAP, etc.). In addition, we provide detailed recommendations to identify, correct and prevent security problems.

BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING

A part of any good Security Package, disaster recovery planning should be built into systems from the start. This approach makes it possible for you to respond to disasters proactively, rather then as a victim of unforeseen events. Our staff has worldwide experience dealing with recovery from a variety of disasters. In addition to our vigorous technical qualifications, we are highly experienced working with organizations that are operating in a contingency or emergency mode. The best business continuity plan is one that is formed before disaster strikes, so we make sure all such planning is an integral part of your comprehensive Security Package.


Even if you don't currently have a disaster recovery plan, VisionOnline can help you recover from unforeseen circumstances. Our disaster recovery team is comprised largely of senior system analysts and network engineers. With strong project management and communication skills, we will lead you through what can be a very difficult process in the least complicated way.

NETWORK SECURITY ARCHITECTURE ANALYSIS AND DESIGN

Many information security vulnerabilities are due to inadequate network design. VisionOnline network engineers are experienced with a variety of network topologies and protocols that can help you identify and mitigate these vulnerabilities in either existing or new network designs.

Services

VisionOnline offers you the following services as part of our comprehensive Security Package, or as stand-alone improvements to your existing security infrastructure:

bottom of page