Strategic product planning and competitive research,
for product developers as well as end users.
Writing technical white papers,
for educational as well as marketing purposes.
Security analysis, vulnerability assessments, risk analysis,
and policy review. We work with end-users
to provide expertise for review of, or assistance in
developing, a network and computer security policy.We analyze and test
networks for vulnerabilities. We also work with
software vendors developing or reviewing security architectures.
Security expert witness. We are available to provide input, guidance, and
expert testimony in the areas of computer and network security and
security best practices.
Independent product reviews. We test and review security
products, providing you results and recommendations. We do this for
vendors as part of product Q&A;, or for end-users as part of a
product qualification and selection process.
Seminars and training. We organize technical panels for
industry conferences and workshops.
We provide customized on-site instruction and offer full day
seminars covering many aspects of computer, network, and information
Course descriptions are here.
Corporate electronic mail, strategies and implementation.
We have extensive expertise designing corporate e-mail strategies,
e-mail system design, and e-mail configuration, as well as spam detection
and anti-spam measures.
We have experience with Sendmail, PostFix, and e-mail encryption systems.