Combining more than 25 years of experience in complex Networking and Computer Security and 5 years in forensic investigation, we have developed a unique expertise that we make available through 4 specific domain:

AUTOMATED VULNERABILITY SCANNING

The automated vulnerability scanning is a unique expertise developed by Wolf Technologies from thousands of hours of vigilant anti-hacking research. It is a very powerful and unique platform that does vulnerabilities correlation. Such correlation, if left undetected, can hinder your computer systems and render your applications susceptible to hackers with an end result of putting at risk the confidentiality of your data or your clients data.

This remote scanning platform is very powerful: It includes an extensive list of all the vulnerabilities known today and will use this list to scan, on a daily basis, the servers that are hosting your website and your web applications.It will identify the vulnerabilities, in real time, classify the various risks and offer solutions and recommendations, sorted by categories.

First and foremost, our scanning platform will inspect your services against the "SANS 20?. These vulnerabilities are defned by the SANS institute, the FBI and the FedCIRC (http://www.sans.org/top20). The platform will make sure that all 7 layers of the OSI model will be scanned daily and that your server will be free of XSS, code injection and SQL injection. After this very important step is completed, we will then scan for other vulnerabilities, again, on a daily basis.

ETHICAL HACKING

Computer hackers try to exploit vulnerabilities in systems to gain access to personal and confidential informations.To do so, they undergo different tests who allows them to study the victim to prepare different attack scenarios to exploit one or many of the vulnerabilities, to gain unauthorized access to one or many of your resources.

An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing and red teaming. An ethical hacker is sometimes called a white hat a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.

SOCIAL ENGINEERING SECURITY ASSESSMENT SERVICES

Wolf Technologies is now offering social engineering services to enable organizations to understand human threats that could pose risks to their organization. These risks could be exploited through the infrastructure, people, the environment or third exposure. Phishing tests of all sorts, social networks exploiting, identity theft, etc. will be done to allow our clients to understand every aspects of their social security and take action thereafter.

COMPUTER FORENSIC

Forensics set the use of science and technology to investigate er gather proof of illegal electronic activities. These days industrial espionage. Intellectual property violation et hacking are all technologically illegal activities which business or individuals must face. When one of these incidents occurs, the first question is what happened? We are here to find out.




2017 © Wolf Technologies
Realisation : Évolution Graphique, Les Technologies Wolf

Wolf Technologies
Tel: 418 704-2623
Toll free: 1 844 418-8896
info@technologieswolf.com
Follow us: