Syrinx Technologies

Syrinx Technologies Service Offerings

Syrinx Technologies offers a comprehensive array of systems and network security services. Clients choose the specific services they need and then a scope of work is written based on the particular services requested. This helps control costs by committing the client only to the specific services needed. The following is a brief overview of these services:

  • Defensive IT Security 101
    • Working together with a client, Syrinx Technologies will create and deliver specific training on the proper use of tools designed to identify common security vulnerabilities in many different areas of the computing infrastructure. The client is taught how to perform "self assessments" which will greatly increase the overall security of the systems and network infrastructure. The goal is to allow the client to catch the majority of issues and remediate them, thereby saving money on audits performed by 3rd party companies. This class is not a "how-to hack" class, but rather teaches the proper use of tools which will identify common areas of weakness. Click here for more information.
  • Laptop Audit
    • Lost and stolen laptops have become a major issue for organizations with a mobile workforce. Rarely a week goes by without a major incident involving laptops and sensitive data. The costs of thes incidents can be measured in real dollars and the organizations reputation. Syrinx Technologies has developed a service offering where it will test the security of a laptop in order to help an organization develop a secure model for laptop builds. The goal is to develop procedures for building new, secure laptops in the future.

      All facets of the security controls provided by the laptop will be tested and attempts to leverage any information found on the laptop will be performed. The only requirement is that a laptop be provided in the same condition and with all peripheral devices as it would appear during an actual theft. Syrinx Technologies will analyze the security controls and produce a report detailing attempts to bypass the security controls and provide recommendations for improving the security posture for the laptop. Statistics show that one in 10 laptops will be stolen. Don’t wait until your organization becomes another statistic. Download this PDF for more information and service specifics.
  • Penetration Testing
    • The purpose of a penetration test is to simulate an attacker attempting to gain unauthorized access to a network resource. The attack could occur from the outside or the inside of the security perimeter. It could come from an employee, customer, competitor or anonymous Internet user. The testing can be performed from an external or internal perspective, or both. This testing includes dial-in, wireless and social engineering assessments. Download this PDF for information on the testing methodology used by Syrinx Technologies.
  • PCI Consulting
    • Syrinx Technologies can offer consulting assistance to organizations working towards PCI compliance. While Syrinx Technologies is not a QSA or ASV, it can offer consulting in many phases of the process. It can also help by offering penetration scanning which satisfies Rule 11.3 for both internal and external testing. Syrinx Technologies has created a "cheat sheet" with information on "who, what and when" regarding PCI. Download the PDF here.
  • Policy and Procedure Review
    • Many companies have already developed standards but want to periodically examine and update them to keep current with technology. Standards that were developed years ago need to be updated in order to remain useful in the ever-changing world of technology. Syrinx Technologies can assist the client in developing new policies and procedures, or audit existing policies and procedures.
  • Virtual CSO
    • Currently under development, this offering will allow those organizations without a full-time dedicated security resource to enjoy all the benefits without the high cost. Download this PDF for more information and service specifics.