Skip to content
Vulnerability management
Only teams of information security professionals are capable of providing security.
  • Home
  • About Us
  • Services
  • Contact Us
  • The vulnerabilities we found
  • RTM Group

Author: admin

Enterprise SSO Products

January 19, 2021 admin Leave a comment

Enterprise SSO products are designed for large companies with a heterogeneous, distributed computing environment consisting of many systems and applications.…

Continue Reading →

Threats and vulnerabilities of wireless networks

December 10, 2020 admin Leave a comment

When building wireless networks, there is also the problem of ensuring their security. Whereas in conventional networks information is transmitted…

Continue Reading →

Mechanisms for implementing attacks on computer networks

November 18, 2020 admin Leave a comment

The following information can serve as objects of protection in the framework of computer networks: in the elements of the…

Continue Reading →

Software structure

October 22, 2020 admin Leave a comment

The set of programs designed to solve problems on the SVT and in the AU is called software (SW). The…

Continue Reading →

Security Analysis of Information Systems by Penetration Testing Method

September 25, 2020 admin Leave a comment

Penetration testing is a security assessment method consisting in modeling an attack by an attacker to detect vulnerabilities in the…

Continue Reading →

Computer viruses and defenses against them

August 31, 2020 admin Leave a comment

Protection against computer viruses is a separate issue, the solution of which is the subject of many books, textbooks and…

Continue Reading →

Strong authentication

July 29, 2020 admin Leave a comment

Basic concepts The idea of strong authentication implemented in cryptographic protocols is as follows. The verified (proving) party proves its…

Continue Reading →

Firewall technology

June 18, 2020 admin Leave a comment

A firewall is a specialized firewall complex, also called a firewall or firewall system. ME allows you to divide a…

Continue Reading →

Security Audit Methods

April 27, 2020 admin Leave a comment

Audit refers to the use of automated mechanisms that cause the creation and storage in a secure computerized log of…

Continue Reading →

Recent Posts

  • Enterprise SSO Products
  • Threats and vulnerabilities of wireless networks
  • Mechanisms for implementing attacks on computer networks

Recent Comments

    Archives

    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • April 2020
    Privacy Policy
    Copyright © 2021 Vulnerability management — Ascension WordPress theme by GoDaddy