DHTML Menu, (c)2004 Apycom

67% of senior tech executives admit their organization has experienced a security breach in the past 12 months. (But 41% did not report the incident to authorities.) BusinessWeek from Pricewaterhouse Coopers/ CIO Magazine study

In 2004, the average time between public disclosure of a vulnerability and the release of exploit software was 5.8 days -- Internet Security Threat Report

Half of all computer crashes reported by its customers are caused by spyware and its equivalents. - Microsoft

90 percent of all personal computers could be infected with at least one form of spyware. - National Cyber Security Alliance

There was a 400% increase in the number of Win32 viruses and worms released in the first half of 2004 -- Symantec

Consulting Services

At ClearPath Security, we believe in providing a complete solution, not merely selling point products. To that end, we would like to be your partner in delivering the most secure and robust network possible to your employees and customers.

We are the
"No Hardware - No Software Agenda"
 IT company

Allow us to sit down with you and offer our expertise. Together, we can devise a plan that will be unique to your needs. The consultation is free, the benefits are immeasurable.

ClearPath engineers are available for short and long term projects within the Front Range area as well as remotely via remote administration solutions.

Some of the areas that we can assist organizations in are:

  • Network security assessments

  • Security policy creation

  • End-user security awareness training

  • Network audits and penetration studies

  • Network monitoring

  • VPN deployment

  • Hardware / Software inventory

  • Web and Email solutions

  • Malicious software removal

  • Remote access solutions (Terminal Services, Citrix)

  • Hardware and software troubleshooting

  • New server/network integration and deployment

  • Network administration

  • Co-located server support

  • Disaster Recovery Planning

  • Wireless site survey and implementation

  • Regulatory compliance (GLBA, HIPAA, SOX)

Whether you have an extensive RFP, or need assistance detailing your needs, please offer us the opportunity to address your needs. Our consultants are available to serve you.



 Network Security Best Practices
  • Turn off and remove unneeded services

  • ALWAYS keep your patch levels up to date, especially on systems that face the Internet and are accessible through the firewall, such as HTTP, FTP, Mail and DNS services

  • Enforce a password policy as part of an overall Internet Use policy

  • Keep antivirus definitions up to date

  • Isolate infected computers quickly to prevent further compromise

  • Start an employee network security training program

  • Scan all Internet downloads for viruses with an updated antivirus scanner

  • Ensure emergency response procedures are in place

  • Configure your email server or firewall to remove or block file attachments that are commonly used to spread viruses such as: .vbs, .bat, .exe, .pif and .scr

  • Audit systems regularly to ensure adequate controls are in place






  Free Consultation  |  Solutions  |   Training  |  Consulting Services  |  Customers
Copyright 2002-2006,  ClearPath Security LLC   Terms of Use   Privacy