Check 4 Hack
In our experience, merely installing solutions that attempt to prevent an attack will not work. It has long been obvious that protecting against previous attack vectors is ineffective; attacks have changed methods and moved on to new techniques. For this reason we have developed a special, practical security assessment program that examines whether the infrastructure has already been compromised and what other weaknesses exist. The Check 4 Hack process includes 3 elements: - Network Forensics - Vulnerability Analysis - password analysis in order to ensure maximum system security.
IT-Security Consulting
The IT security solutions that QGroup deploy come from the very high security government and military arenas. This means that many of our concepts and products go far beyond the usual strategies and architectures and offer our customers exceptionally secure solutions. Due to our experience this can often be done with even a short consulting project. We take customers into the world of trusted computing, multi-level security, and compartmentalization and apply many other interesting security features in order to identify the best possible solutions to the unique challenges of each customer. The goal is to always make the right choice of weapons in terms of risk and to reduce the extent of potential damage.
IT-Forensic
Even the best cyber defense measures do not provide total protection against malware incidents, cyber attacks, and other types of violations. Therefore, it is important that the proper analysis and defensive are taken as quickly as possible. QGroup can support you with trained IT forensics personnel who investigate the attack in order to learn how the attack was initiated and carried out, which systems were compromised, and what confidential data has been stolen. QGroup GmbH analyzes the attack in detail and secures the digital traces.
Penetration Testing
Traditionally QGroup comes from the military field of prevention. We do not see ourselves as a classical penetration tester, however, we have the skills to do so. Our experience with various security projects with various customers has shown that our penetration testing is often better that that performed by our competitors. In addition to classic black and white box tests, we offer our customers an architectural attack vector analysis and segregation tests. We also use powerful technology to evaluate passwords against “brute force” attacks and this can help increase the security level of our customers.
Trusted Computing
The basis of our architecture is a secure, military operating system that is based on “Labeled Security.” This allows the system to provide multilevel security, compartmentarization, roles and privileges. The audit trail is also recorded and protected. These technologies and features were developed by the military and we use them to meet the specific security requirements of our customers. As a result other security vendors request our help when their customers need trusted computing as part of the solution.
Security Operations and Outsourcing
If you do not have time or the resources to implementing your security your security strategy, we can install, configure and operate your security components for you or support you as an outsourced security team.
Security Monitoring
Continuous and proper monitoring of the security tools installed on your IT infrastructure is an extremely important function. As a minimum it is important to minimize the time between the detection of a successful attack and a response. This involves monitoring of all SIEM sources, all safety systems and the functionality of SIEM system itself. All systems that are part of the Security Incident Response must be watched.
Password Audit
A company's passwords are checked using methods such as brute force, dictionary attack, known initial passwords and combinations of these methods. The resulting findings provide information about which passwords are easy to break. In this way, measures can be taken to improve the quality of passwords.