Skip to content
Vulnerability management
Only teams of information security professionals are capable of providing security.
  • Home
  • About Us
  • Services
  • Contact Us
  • The vulnerabilities we found
  • RTM Group

Category: Uncategorized

Registration and audit

February 17, 2021 admin Leave a comment

Registration is another mechanism for ensuring IP security. This mechanism is based on the accountability of the security management system,…

Continue Reading →

Enterprise SSO Products

January 19, 2021 admin 9 Comments

Enterprise SSO products are designed for large companies with a heterogeneous, distributed computing environment consisting of many systems and applications.…

Continue Reading →

Threats and vulnerabilities of wireless networks

December 10, 2020 admin 337 Comments

When building wireless networks, there is also the problem of ensuring their security. Whereas in conventional networks information is transmitted…

Continue Reading →

Mechanisms for implementing attacks on computer networks

November 18, 2020 admin 15 Comments

The following information can serve as objects of protection in the framework of computer networks: in the elements of the…

Continue Reading →

Software structure

October 22, 2020 admin 31 Comments

The set of programs designed to solve problems on the SVT and in the AU is called software (SW). The…

Continue Reading →

Security Analysis of Information Systems by Penetration Testing Method

September 25, 2020 admin 638 Comments

Penetration testing is a security assessment method consisting in modeling an attack by an attacker to detect vulnerabilities in the…

Continue Reading →

Computer viruses and defenses against them

August 31, 2020 admin 124 Comments

Protection against computer viruses is a separate issue, the solution of which is the subject of many books, textbooks and…

Continue Reading →

Strong authentication

July 29, 2020 admin 168 Comments

Basic concepts The idea of strong authentication implemented in cryptographic protocols is as follows. The verified (proving) party proves its…

Continue Reading →

Firewall technology

June 18, 2020 admin 127 Comments

A firewall is a specialized firewall complex, also called a firewall or firewall system. ME allows you to divide a…

Continue Reading →

Security Audit Methods

April 27, 2020 admin 162 Comments

Audit refers to the use of automated mechanisms that cause the creation and storage in a secure computerized log of…

Continue Reading →

Recent Posts

  • Registration and audit
  • Enterprise SSO Products
  • Threats and vulnerabilities of wireless networks

Recent Comments

  • Best Online Loans on Strong authentication
  • Gretchen Lee on Security Audit Methods
  • Sharon Reilly on Computer viruses and defenses against them

Archives

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
Privacy Policy
Copyright © 2021 Vulnerability management — Ascension WordPress theme by GoDaddy