Configuration Auditing

By: TOPSTONE  05/14/2015

TOPSTONE configuration auditing provides customers with due diligence and peace of mind knowing which systems have been compromised, where, and why. Our extensive configuration auditing services can assess networks, both wired and wireless, servers, desktops, laptops, and mobile devices. Systems / Networks Include: -- Network devices: Firewalls/Routers/Switches (Juniper, Check Point, Cisco, Palo Alto Networks), printers, storage -- Offline configuration auditing of network devices -- Virtualization: VMware ESX, ESXi, vSphere, vCenter -- Operating Systems: Windows, Mac, Linux, Solaris, BSD, Cisco iOS, IBM iSeries -- Databases: Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL -- Web applications: Web servers, web services, OWASP vulnerabilities -- Cloud: Deployed as AWS AMI Auditing Standards: -- CERT -- CIS -- COBIT / ITIL -- DISA STIGs -- FDCC -- ISO -- NIST -- NSA

Other products and services from TOPSTONE


Operational Readiness

Operational Readiness is the art of maintaining a state of readiness, awareness, and agility. Poised to respond calming, and methodically


Cybersecurity Training and Development

Most people think business is driven by profit, but it isn't. Business is driven by people. People making calls, decisions, and taking action on a variety of information technology platforms. Focusing on providing end-user training to your employees will ensure their readiness and commitment to your operational readiness when it matters most. Here at Team TOPSTONE, we are engineering the un-hackable company by focusing on your people. There is a better way. Try us out


Compliance Auditing

When your momentum, reputation, and profits are on the line, due diligence is crucial. At Team TOPSTONE, we are engineering the un-hackable company. There is a better way. Try us out


Cybersecurity Engineering

We are Team TOPSTONE and we are engineering un-hackable companies and driving change in cybersecurity.