Penetration Testing & Risk Assessments

What are you trying to protect? Who are you trying to protect it from? How are you going to protect it? These are important questions. Risk Assessment, Compliance Toolkits, and Penetration Testing can help you answer those questions. Armed with a combination of commercial and non-commercial tools, along with knowledge and experience, and hand validation of vulnerability finds, Mission Critical Systems Engineers can tell you what you otherwise might not see.


Vulnerability Assessment

A practical approach to vulnerability reduction is needed with strategy development. Vulnerability analysis is the front line in securing the organization and a custom built methodology will be developed to utilize your personnel and financial resources to provide the best solution to meet your business needs. We provide a programmatic approach for evaluating technical, administrative and management security controls across your environment. Vulnerability scanning is a necessary tactical approach to securing all the “low-hanging” risk in your infrastructure. We will conduct tests against your Internet perimeter and internal systems using real world attacks techniques, both automated and manual.


Wireless Risk Assessment

Wireless security has become both an internal and external problem. Companies are implementing wireless infrastructures internally but do not properly secure them. Employees can setup wireless access to the internal corporate infrastructure to bypass security controls or access the network from insecure wireless networks on the road or at home. This poses an entry point into the network that can be hard to control, monitor and audit. We can provide a Wireless risk assessment that looks at the infrastructure you have setup, policies and procedures in place, test the implementation for vulnerabilities and provide guidance on securing future wireless architectures against emerging threats.


Check Point Software CCSP

Mission Critical Systems provides Certified Collaborative Support Provider (CCSP) services with full back-end support from Check Point. We provide expert service and support and are committed to give our customers the best support available to keep their business secure.

Consulting and Evaluations

Information security is our only business.  Because there are many ways to solve a problem, we can help you explore all of your options to secure your networks.  Our engineers will ensure that you meet your strategic goals by guiding you to purchase products that best fit your environment.  In addition, we will absolutely assist with the proof of concept or an evaluation to guarantee that you know a product meets your needs before you purchase it.  Mission Critical Systems' goal is demonstrating the value we provide through knowledge, capability and integrity so that we earn your business for the long term.

Managed Services

Managed Services are coming in many forms including Network Monitoring (Firewalls, IPS, Anti-Virus), Hosted Services (Spam, URL, and Encryption), and Software as a Service (Web Application Scanning). These options give you the best solutions and skills to allow you not focus so much on day to day managing. Finally, someone else is on call.


Knowledge is power. Proper training on your Check Point Firewall or your other IT Security solutions is essential to maximizing your investment. Mission Critical Systems is a Check Point Authorized Training Center, and hosts classes at our Florida Check Point Training facility or private on-site Check Point Firewall training for your entire team. All classes are taught by a Check Point certified instructor. Once the course is completed, the instructor will prepare you for the certification exam. A small initial investment in training ensures you get the most out of your Check Point Firewall investment as well as making yourself more valuable as an employee.


Check out our schedule on the Events page