Database Security
Assessment & Oracle Auditing Services
Every
year, thousands of companies experience an un-wanted intrusion or data
privacy violation.
Many of today's systems are vulnerable to attack by viruses and
malicious hackers who seek to destroy your mission-critical systems, and
even more have inadequate data security.
Donald
Burleson is considered one of the world's leading Oracle security
experts. The author of 18 database books and Editor-in-chief of
Oracle Internals, Donald Burleson has developed proprietary techniques
to quickly locate and correct Oracle
security exposures.
We
have conducted security assessments for many large companies and we provides a
complete White Hat Hacker services to quickly identify all security
exposures in any area of your environment, including the network, server and Oracle
database.
Oracle Security Assessment
The
Oracle security assessment involves a complete review of all Oracle
security components. This services includes:
-
Full audit of
role-based security
-
Full audit of
fine-grained access control (virtual private database)
-
Audit of "grant
execute" security
In addition, the
Oracle audit service identifies the following Oracle security exposures:
-
Identification of
all SQL*Net, Net8, or Oracle*Net exposures
-
Identify users
with external passwords
-
Find system
privileges that possess the WITH ADMIN option
-
Locate end-users who
are granted system privileges
-
Search for all
non-DBA roles that possess the WITH ADMIN option
-
Identify all table
privileges that can be granted to other users
-
A complete review of
all tables that are granted PUBLIC access
Network Security Assessment
BC
provides complete Network security assessment services, including the
following checks:
-
Firewall security
assessment
-
Enforcement of
Network security policies
-
Router security
checks
-
Review of Kerberos
and remote authentication servers
UNIX Security assessment
BC employs one of the world's leading Oracle
security experts to provide complete UNIX security assessment
services.
- Review of network security policies
- Review of UNIX vendor security updates
- Complete UNIX vulnerability assessment
- Password strength checking
- Use of UNIX shadow passwords
- Checking for improper rhosts connectivity
- Checking sticky bits for exposures
BC also offers customized remote UNIX and Network
administration consulting services.
Click here is
see the BC UNIX and Network Consulting services.
Send an e-Mail
Don
Burleson and get a customized quote for your company or
 |