Core Networks Inc. is an independent computer consulting company focused on providing organizations with complete cyber security services, solutions and consulting for New England-area businesses. We are experts in providing our clients with a number of services that expose vulnerabilities and system risks, including:

• Penetration testing, ethical hacking
• Forensics/incident response
• Vulnerability assessments
• Network, server and storage infrastructure solutions
• Cyber security infrastructure design
• Onsite support contracts for IT departments
• Secure cloud and virtualization solutions

Our aim is to assist your organization in identifying and reaching your security goals. Please click on a tab title below for more detailed information on the services we provide.

Penetration Testing
We specialize in External, Internal, Social-Engineering, Web Application, Wireless, and Mobile Penetration Testing.

The purpose of a penetration test is to demonstrate the risk and impact that existing vulnerabilities, configurations and lack of security awareness training can have on a business. The goal of a penetration tester is not to get a shell on a Microsoft AD server or show off the credit card dump from a SQL injection flaw found on a website. While that can be exciting work, it’s not particularly helpful to the customer. We conduct penetration tests with a wide range of criteria and scope always keeping four main goals in mind:

1. Penetration test safely as to not create a denial of service.
2. Perform a well-planned, organized and thorough assessment.
3. Deliver a valuable report with low, medium and high risk vulnerabilities.
4. Remediation support.

For more information, visit either our technical details or non-technical specifics pages.

Develop Information Security Protocols

  • General Practices
  • ISO,  PCI, HIPPA, NIST Compliance
  • IT Policy Documentation assistance
  • Incident Response procedures
  • Data Retention and Disposal Policy
  • Internal and External assessment
  • Network Infrastructure

Security Consulting
Network Intrusion Detection and Prevention (IDS/IPS) Design and installation

With an endless emergence of new threats and company resources under constant pressure, it can be difficult to balance all of the strategic and operational tasks required for an effective information security program. Network Intrusion Detection and Prevention (IDS/IPS) devices can provide a highly effective layer of security designed to protect critical assets from cyber threats.

IDS/IPS devices are only effective if they are well tuned to the current threats and the network in which they are deployed. These devices can generate thousands of alerts each day and are very prone to false positives, making it difficult to identify true threats and take timely action to protect assets.

Core Networks helps organizations professionally design and install IPS/IDS systems that detect attempts by attackers to compromise systems, applications and data. We support Cisco NextGen IPS, Snort based IPS and many others.

SMB and Enterprise Antivirus Solutions

All-in-one security for endpoints combines antimalware, anti-spam, two-way firewall, content filtering and remote administration – all providing effective protection for desktops, servers, mobile devices and cloud based services. Core Networks is partnered with ESET and has enterprise level experience installing and supporting many other endpoint security providers.

Web Filter and Mail Filter Solutions

Content Filtering Solutions manage all inbound and outbound email, web and other traffic to protect organizations from web and email-borne threats and data leaks.  We design and install virtual and physical content filtering appliance solutions. We are partnered with Cisco, F5 and Barracuda Networks.

Forensics & Incident Response
Core Networks are experts in Networks, Computer, Malware and Mobile Forensics.

What is Incident Response?

Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. An incident response plan includes a policy that defines, in specific terms, what constitutes an incident and provides a step-by-step process that should be followed when an incident occurs.

It is not a matter of ‘will’ or ‘can’ we be hacked but ‘when.’

It is only a matter of time before cyber criminals make their way into your organization – no matter how large or small it is or the type of business you conduct. Identity theft, stolen credit card numbers, websites defaced – or worse used to spread malware – are just some of the cyber criminals objectives. These incidents require a rapid response to minimize damage and exposure. It is a fact that many organizations that suffer a major breach never recover.

Core Networks specializes in network, computer, mobile device and malware forensics and evidence gathering.

The most common questions we are asked is:

How did the breach occur?
How did this malware/virus infect our network?
Is there a backdoor for cyber criminals to gain access to our network?
What data did the cyber thieves have access to and what did they steal?

The most effective way to answer these questions is to forensically analyze the network, servers, desktops and other infrastructure. Analyzing network traffic, storage, running processes and programs help us gather the evidence to rebuild the stage of events, including:

  • clicked links
  • downloaded malware
  • how/where it spread
  • cyber criminal activities
  • evidence of anti-forensics (how they covered their tracks)

Networks and Computer forensics

Core Network’s digital forensic analyst investigates computer incidents by collecting and analyzing data from computer systems and networks to track user-based activity that can be used in malware and cyber-crime incidents, internal investigations or civil/criminal litigation.

We have in-depth technical knowledge of UNIX, Linux, Mac OS and Windows Digital Forensics (Windows XP through Windows 8; and Server 2012). We use computer forensic tools such as Access Data’s Forensic Toolkit (FTK), Guidance Software’s EnCase, Registry Analyzer, FTK Imager, Prefetch Analyzer and many more.

Incident responders hunt down and counter a wide range of threats within enterprise networks. We have a proven, industry-standard methodology that gives our customers peace of mind we are gathering the evidence and analyzing it – we piece together the puzzle.

Malware Forensics

The malware analysis helps incident responders assess the severity of a situation that involves malicious software. We learn how to understand key characteristics of malware discovered during the examination, including how to establish indicators of compromise (IOCs) for scoping and containing the incident.

We reverse-engineer web browser malware implemented in JavaScript and Flash, PDF and Microsoft Office files. Reverse-engineering malicious software is accomplished by using a variety of system and network monitoring utilities, a disassembler, a debugger and other tools.

Mobile Forensics

In today’s world of everything and everywhere connectivity tablet computers, phones and other mobile devices are a lucrative target for cyber criminals. Core Networks incorporates mobile device forensics in most incident response events to broaden the scope of evidence finding and analyzing.

Secure Cloud & Virtualization Solutions
Core Networks offers server and network virtualization, enterprise storage solutions and managed networks infrastructure solutions. We have partnered with HP, Cisco, VMware and Microsoft to offer a platform to run an organization’s business critical applications – such as Active Directory and File Servers, Exchange email servers, SQL and many others. We also offer backup and storage replication solutions.

Computer virtualization, network virtualization and software-defined storage deliver abstraction, pooling and automation of the computer, network and storage infrastructure services. See more at VMWare’s The Software-Defined Data Center.