27/12/2025 15:05
Technical Development Services
The technical application development services listed below is a sample of what we can provide, if you don't see the service you require, please ask about it, if we cannot help you we will at least be able to assist you in finding a suitable provider.
Click on any of the headings to view more details...
- O365 / Entra Automation
- Active Directory Integration
- IOT - various
- OS Log File Consolidation
- Home Automation
- Selection of the most appropriate device
- Developing code to perform the required action
- Integration with other hardware or software
- Integration with MQTT
- Small agent footprint on Workstations or Servers
- Real Time log events copy
- Delayed events copy at sepcified time slots
- Selection of a Home Automation system to match your needs
- Implementation
- Configuration
- Integration
- Automated emails
- Automated SMS when thresholds are exceeded
- Periodic push of status updates
- MQTT Integration
- HomeAssistant Integration
- NodeRed integration
O365 / Entra Automation
Development to automate the population and setup of user accounts from a database, csv or extract to Microsoft Entra. When trying to update and manage 1000's of users, this option makes the update and maintenance of Microsoft Entra much simpler and faster to deploy.
Active Directory Integration
Development to automate the population and setup of user accounts from a database, csv or extract to Microsoft Active Directory. When trying to update and manage 1000's of users, this option makes the update and maintenance of Microsoft Entra much simpler and faster to deploy.
IOT - various
We offer a wide range of services to assist you in implementation and integration of various IOT devices based on ESP, Arduino etc. Some of these are :
OS Log File Consolidation
Consilidate all the log files of Windows Devices to a central database for analysis and to assist with troubles hooting and and general log analysis:
Home Automation
:
Consulting Services
Security Standards & Policies
Security policies define controls over the IT processes that ensure systems security by safeguarding information and resources against unauthorised use, disclosure or modification as well as damage or loss. Our consultants have experience in defining and implementing information security policies based on BS7799/ISO1799, CoBIT and FIRM standards. Our implementation strategy follow the cyclic approach described below :
- High level statement of policy
- Definition of control benchmarks
- Defining of control and implementation specifics
- Implementing controls
- Testing controls and compliance
- Measure test results against benchmarks
- Testing and measurement used as feedback to adapt and improve 1-3
This approach ensures that security becomes a continuous process and helps to instil a culture of security within the enterprise. Availability, integrity and confidentiality of information and resources are all taken into account in implementing these policies. External audits performed on our implementations and standards receive excellent reports.
Vulnerability Assessment
A vulnerability assessment comprises of an on-site security review of your network, application and system environment.
During this process we conduct interviews to :
- Develop a clear understanding of the technical and business environment
- Identify any pertinent legal/fiduciary or other requirements that mandate the protection of specific information resources.
- Review data security policies and procedures
We then proceed to test and assess the system security by :
- Mapping the internal network and characterising the system security contour
- Identifying and examining potential network vulnerabilities or weaknesses, and looking for "targets of opportunity"
- Carrying out "zero damage" attacks designed to subvert any existing network controls, or otherwise exploit identified network weaknesses and vulnerabilities.
The final output of the vulnerability assessment is a report detailing the current status of and suggested improvements to :
- Network set up and management
- Third party access controls
- Account/password management and security
- File management and security
- Database security
- Access controls
- Application level security
- Other parameters pertinent to your environment
Penetration Testing
During a penetration test we perform a thorough scan of your network(s) from an exterior (internet, 3rd Party etc.) point of view and provide you with a report detailing your exterior footprint and potential risks / vulnerabilities with a list of remedial steps that can be taken to minimise the risk to your organisation.
System Hardening
We have the skill and experience to assist you in hardening the security on your server, desktop, database, security and networking systems. This pro-active step minimises the risk of system compromise due to malicious acts or accident.
Firewalling
We offer a wide range of services to assist you in implementing and utilising your firewall effectively. Some of these are :
- Selection of an appropriate firewall
- Installation and configuration
- Automated and manual log monitoring
- Log analysis
- Profiling
- Rule base hardening
- DMZ design and implementation
- Complete or partial firewall management outsourcing
Intrusion Detection Systems
Whether you prefer a proven open source solution or one of the available commercial intrusion detection systems, we have the skills and experience to assist you in :
- Selection of an IDS to suit your needs
- Implementation
- Configuration
- Designing custom plugins to suit your environment
- Profiling
- Reporting
- Complete or partial IDS outsourcing
Network and Security Monitoring
We have developed a system to assist in efficient and effective network and security monitoring, this integrates reports and alarms from various other systems into a single console to ensure quick and appropriate response to events that require it. We are able to adapt this system to your particular needs and can offer it as a managed system, where we will perform the monitoring and reporting if required (similar to NOC/SOC integration).
Home | Services | Contact Us
This page was last modified on Thursday 20 June 2024 at 10:29
Please send comments, suggestions or problems with viewing this site
here
© 2002 Ferragus Consulting