Caldarone Consulting
www.caldarone.deCaldarone Consulting is specialized in International Business and Information Technology with strong focus on IT-Security/Cyber-Security: 1. Security Information and Event Management (SIEM) AlienVault USM, OSSIM, ISO 27001, BSI Grundschutz, Alarm and Incident Management, Incident, Threat Management, SOC, NOC 2. Vulnerability Scans / Penetration Tests Greenbone, OSSEC, OpenVAS, OpenSCAP, NMAP, Microsoft Baseline Security Analyzer (MBSA), Microsoft Security Compliance Manager (SCM), Kali Linux 3. Centralized Log Management and Analysis Graylog, nxlog, Syslog, GELF, Beats, Elasticsearch, Log4j, Kibana Network Intrusion Detection Systems (NIDS / IDS) Snort, Suricata 4. Intrusion Prevention Systems (IPS) Fortinet Fortigate, fail2ban 5. Host-based Intrusion Detection Systems (HIDS) OSSEC, AIDE 6. File Integrity Monitoring (FIM) Tripwire Enterprise, Tripwire Open Source, YUM verify, OSSEC 7. Web Application Firewall (WAF) / Load Balancer Cirtrix Netscaler, Apache + mod_security, HAproxy 8. Perimeter Firewalls pfSense, OPNsense, IPFire, Lancom, Sophos, Checkpoint, Astaro, Juniper 9. Windows and Linux Hardening RHEL,CentOS, SLES, Ubuntu, Debian, Windows Server 2008 R2 / 2012 R2 10. Infrastructure Monitoring Nagios, Icinga, Zenoss, Spiceworks 11. IoT / Industry 4.0 IoT Gateways, M2M, REST, Cloud
Read moreCaldarone Consulting is specialized in International Business and Information Technology with strong focus on IT-Security/Cyber-Security: 1. Security Information and Event Management (SIEM) AlienVault USM, OSSIM, ISO 27001, BSI Grundschutz, Alarm and Incident Management, Incident, Threat Management, SOC, NOC 2. Vulnerability Scans / Penetration Tests Greenbone, OSSEC, OpenVAS, OpenSCAP, NMAP, Microsoft Baseline Security Analyzer (MBSA), Microsoft Security Compliance Manager (SCM), Kali Linux 3. Centralized Log Management and Analysis Graylog, nxlog, Syslog, GELF, Beats, Elasticsearch, Log4j, Kibana Network Intrusion Detection Systems (NIDS / IDS) Snort, Suricata 4. Intrusion Prevention Systems (IPS) Fortinet Fortigate, fail2ban 5. Host-based Intrusion Detection Systems (HIDS) OSSEC, AIDE 6. File Integrity Monitoring (FIM) Tripwire Enterprise, Tripwire Open Source, YUM verify, OSSEC 7. Web Application Firewall (WAF) / Load Balancer Cirtrix Netscaler, Apache + mod_security, HAproxy 8. Perimeter Firewalls pfSense, OPNsense, IPFire, Lancom, Sophos, Checkpoint, Astaro, Juniper 9. Windows and Linux Hardening RHEL,CentOS, SLES, Ubuntu, Debian, Windows Server 2008 R2 / 2012 R2 10. Infrastructure Monitoring Nagios, Icinga, Zenoss, Spiceworks 11. IoT / Industry 4.0 IoT Gateways, M2M, REST, Cloud
Read moreEmployees statistics
View all employeesPotential Decision Makers
Interim Chief Information Security Officer | Consultant Cyber Security
Email ****** @****.comPhone (***) ****-****Composer , Guitarist , Private Instructor
Email ****** @****.comPhone (***) ****-****