Learn more here';} ?>



Double Shot Security offers network security consulting services which helps clients understand complex security technologies and the myriad of regulatory compliance issues affecting today's business operations. The company works with corporate and government clients to analyze critical security requirements and to design effective and practical secured network infrastructures. Double Shot Security also works with equipment vendors and the venture capital community. Equipment vendors leverage the operational and technical knowledge to create more effective product strategies and feature-sets. Venture capital clients use Double Shot Security to provide technical due diligence for potential security company investments.


Double Shot Security provides training and education on a variety of network security issues with the main focus being a comprehensive understanding of security fundamentals and detailed understanding of tradeoffs between technologies and product features. Clients can include equipment vendors, ISPs, enterprise business or government institutions.

The training is tailored specifically to meet specific client requirements and can include any or all of the following material:

Security technology fundatmentals and protocol details
• Cryptography fundamentals
• Most commonly used security protocol standards (including SSL, SSH, IPsec, TACACS+, RADIUS, Kerberos, X.509, 802.1x)

Creating an effective security policy for your corporation
• Components of an effective security policy
• Risk assessment/analysis/mitigation
• Incident handling

Systematic approach to securing the network infrastructure
• Practical design and feature considerations for infrastructure devices (routers, switches, firewalls, IDS systems)

Network security considerations in wireless networks
• Protocol pitfalls
• Existing security functionality
• Emerging standards

Network security considerations in VoIP networks
• Protocol pitfalls
• Existing security functionality
• Emerging standards

Network security considerations in IPv6 networks
• Fundamentals of IPv6 networks
• Comparison to IPv4 security issues
• Specific IPv6 protocol issues

All training would be conducted at the client facilities and hands-on workshops can be incorporated into the material if desired.


Double Shot Security analyzes network infrastructure components and performs a systematic audit of network infrastructure security architectures and deployments. This can encompass vulnerability scanning or an analysis of network infrastructure device configurations. The devices included in the analysis are constrained to the core expertise of Double Shot Security which encompass routers, switches, firewalls, authentication systems and Intrusion Detection Systems. These devices can be independent vendor products or commonly used free-ware software on any UNIX system. In wireless networks and VoIP networks, the network infrastructure components to be analyzed can have additional equipment (such as wireless access points and VoIP gateways or proxies) which will need to be considered to effectively perform a security audit.


Double Shot Security offers design experience to its clients and will work with in-house IT personnel or 3rd party network consultants to design comprehensive secure infrastructure architectures for corporate networks.


Double Shot Security creates presentations which the client may retain for its own intellectual property. The clients for these types of presentations are primarily product vendors who need to create effective technical marketing presentations to educate their customers on product security features and functionality.


Double Shot Security writes technical white papers to describe specific security technologies or features. This service is primarily used by product vendors for collateral to their customers and partners. The writing service is also available as a free-lance service for magazines and technical publications.


Double Shot Security performs 3rd party equipment evaluations and interoperability testing for security related services. Specifically, IPsec testing in varying network configurations including routing infrastructures, VPN deployments, VoIP networks and wireless networks is critical to ensure interoperable deployments. The tests can be performed for end-user clients who want an independent unbiased viewpoint. Equipment evaluations and interoperability testing can also be performed for vendors to provide an independent evaluation of a competitor's product.

template() == "asdfasdfasf") { echo'

WHat is real security?

tagline goes here

Explore Resources
'; } ?>