Version

Managed Intrusion Prevention and Detection

Preventive Control: IPS infotex uses an automated Intrusion Prevention Service that responds to predictable attacks within seconds. We get our signatures from Emerging Threats Pro, which reportably catches double the amount of malware, 20% more “exploits”, and about 10% more...

Dynamic ACL Updating

Dynamic ACL Updating Dynamic ACL Updating is a type of access control list, or IP traffic filtering feature, that relies on telnet connectivity, authentication and extended ACLs. This can be used in conjunction with other standard access lists and static extended access list...

Bleeding Snort

BleedingSnort is now EmergingThreats Staying at the Edge of Day Zero Threats and Vulnerabilities infotex has always been concerned about making sure that our managed services can address Day Zero threats and vulnerabilities. In this aspect, we have been a leader in the indu...

Awareness Training

Information Security is Systemic Too often we view information security as a technology issue related to policy and procedures. However, we know that people present the greatest risk. Information security is organic… a process that relies heavily on a team approach involving...

Web Application Security Reviews

According to the National Vulnerability Database and nCircle VERT (Vulnerability and Exposure Research Team), Web application vulnerabilities have increased from 1.9% of all published vulnerabilities in 2006 to over 52% in 2009. Meanwhile, even seemingly “benign sites” like ...
Cookie-cutter approaches do not work in Information Security. The economy of scale yields a lack of security, in our opinion. Though we do bring extensive templates, lexicons, and tuning processes to a managed services engagement, we take great pride in our ability to custom...
Having made the decision to “outsource” or to “get more professional help,” the next decision you need to make is this:  Are you really willing to hand over the important monitoring function to a cookie-cutter approach?  When you do your homework, you will find that infotex ...

Mailing Lists

Get Information Security and IT Risk Management news right to your e-mail box! As part of infotex‘s service to our clients, we attempt to alert you of relevant security issues. This includes notification of threats and vulnerabilities, patches, articles and other issue...

HIPAA Security Matrix 3

< BACK NEXT > Risk Analysis Security Management Process Standard Section Implementation Specification Administrative Safeguards Security Management Process 164.308(a)(1) Risk Analysis (R)     Risk Management (R)     Sancti...