![](/templatesesp/templates/template_mobil/icons/tick.png)
Security Auditing & Scanning.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Penetration Testing.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Vulnerability Scanning.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Malware Scanning.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Vulnerabilities removal.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Patching for Vulnerabilities.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Upgrading Applications.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Security Hardening.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Webapplication Firewall.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Intrusion Detection Systems.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Real time Monitoring.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Security Hardening for Layer 3, Layer 4 & Layer 7 Exploits & Attacks
Cross-site scripting.
![](/templatesesp/templates/template_mobil/icons/tick.png)
SQL injection.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Path disclosure.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Denial-of-service attack.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Arbitrary code execution.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Memory corruption.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Cross-site request forgery.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Data breach (information disclosure).
![](/templatesesp/templates/template_mobil/icons/tick.png)
Arbitrary file inclusion.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Local file inclusion.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Remote file inclusion.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Buffer overflow.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Other, including code injection (PHP/JavaScript), etc.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Update kernel to latest stable version and patch for vulnerabilities or exploits.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Disk Partitioning and enforcing Disk Quotas.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Configuring Package Managers and Repositories.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Disabling unused Protocols.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Eliminating unused services.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Minimizing Open Network Ports.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Securing Binaries.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Securing Key Files and Configuration Files.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Setting and Enforcing Password Policies.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Limiting Root/SuperUser privileges.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Warning Banners for enforcing security policies.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Implementing Firewall Protection.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Configuring TCPWrappers.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Enabling System Logging, Auditing and log rotation.
![](/templatesesp/templates/template_mobil/icons/tick.png)
System Accounting using auditd.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Configuring Backups.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Implement Integrity checking.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Software
Disabling X window system.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Implementing Intrusion Detection Systems.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Implementing Linux Socket Monitor.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Configuring SeLinux for enhanced Security.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Implementing AntiVirus Protection.
![](/templatesesp/templates/template_mobil/icons/tick.png)
TCP/IP stack hardening in Linux kernel using sysctl.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Webserver Hardening – Apache 2.X, Nginx 1.X, Lighttpd 1.X & Litespeed, PHP, CGI, DDoS & Outbound SPAM protection.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Mail Server Hardening – Postfix, Exim, QMail, Courier, Dovecot, Zimbra
![](/templatesesp/templates/template_mobil/icons/tick.png)
Databas Server Hardening – MySQL, PostGreSQL, MariaDB.
![](/templatesesp/templates/template_mobil/icons/tick.png)
SSH Server Hardening.
![](/templatesesp/templates/template_mobil/icons/tick.png)
FTP Server Hardening – ProFTPd, Pure-FTPd, VSFTPD.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Control Panel Hardening – Hosting Control Panel, Webmail, Statistics.
![](/templatesesp/templates/template_mobil/icons/tick.png)
Enable Encryption for critical services