RSB Infosec is a dynamic and responsive online security provider.
Safeguard Your Business
We provide our clients the security solutions to keep up with the ever-changing global threats
RSB Infosec is a dynamic and responsive online security provider. Through security mapping and threat assessment we build watertight data networks and shield your data from external online attacks. Swift, reliable and agile; we keep up with the world of online security to provide continuous protection for your business.
Areas Of Expertise
We assist our clients with architecting and deployment in these domain areas
IT Security Assessment
At RSB, we assess your security using a number of key performance indicators. By examining the following three crucial elements of your systems, we calculate the robustness of your overall security: the confidentiality of the information you store, the number of weaknesses we have identified through our testing and the vulnerability of these weaknesses to exploitation.
Third Party Suppliers
- Risk Register
- Security Awareness Training
- Secure Data Handling
- USB Access
- Backup And Restore
- System Access Levels
- Segregation Of Duties
- Network Access Control
- Rogue Wireless Ap Testing
- Incident Response Process
Our IT security assessment criteria evaluates your IT security resilience by comparing it to industry best practice.
- Backup and restore process, including evidence of regular test restorations
- Copy of Information Security policy
- Current network diagram
- Data protection officer role and responsibilities
- Data workflow, process & lifecycle
- IT Risk Register
Some Of The Tools We Use
Ping, Traceroute, Whois, Dig, Host, Finger, Netstat
Nmpa, THC-Amap, GIF LANguard-3, Firewalk, Solarwinds toolsets, Hping2Vulnerability
Qualys, Acunetix, ISS Internet Scanner, Sam Spade, SARA, GFiLANguard-7, Nikto, Hping2, N-Stealth, WEPCrack, SuperScan, Retina, SAINT, Xprobe2, Shadow Security Scanner, CodeSpy
AirSnort, Snort, Ntop, Netcat, Odysseus
Hunt, Kismet, Ettercap, Dsniff, Ethereal, Netsumbler, TCPDump
Web Application Assessment
Our application security experts will scan all existing third party survives (eg web portals, firewalls, service providers).
- Broken Access Control
- Broken Authenication and Session Management
- Buffer Overflows
- Cross Site Scripting (XSS) Flaws
- Customised Software Analysis
- Denial of Service
- Improper Error Handling
- Injection Flaws
- Input Validation
- Insecure Configuration Management
- Insecure Storage
- Password Cracking/Payload Development (Exploits)
- Perimeter Device/Operating System/Service Assessment
- Reverse Engineering the Stack
Theory’s great, but we like action. What better way to show our clients the severity of system vulnerability than to perform a dry-run of a potential attack. Exploitation of vulnerabilities can lead to privilege escalation of denial of service (DoS) against the computer that is attacked. The attacks can slow down or completely cripple your system. By using their access to your site, malignant hackers can then use this to gain access to client systems.
Secure Architecture Design Review
In our Secure Architecture Design Review, we take four distinct steps to ensure that you have a comprehensive and complete plan for improving the security of your site.
Room 301, Reliance Center, Woodvale Groove, Westlands, Kenya
business is everything. And with RSB you have
a team of experts to hand.