This service is used to identify, categorize and design response protocols for specific points of failure on a network.
After identifying the characteristics of the problem, IdentiTel will begin to narrow the focus of our efforts by:
- Identifying the specific devices involved in the problem
- Checking the version, updates and GUI defaults running on each device
- Determining if there was an undocumented change on the network
- Verifying the integrity of the IP and VoIP network
Once the problem has been identified, protocols and procedures can be put into place protecting the network from a future breach.
Through mapping and administration of the customer network in conjunction with IdentiTel’s ISRM weaknesses can be detected and corrected.