SlideShare a Scribd company logo
1 of 6
Download to read offline
LANSECURITY
ASSESSMENTSERVICES
www.vsec.com.vn
Vietnamese Security Network JSC – LAN Security Assessment Services
www.vsec.com.vn
Why LAN Security Assessment?
With interactive information demands, it is important for
agencies and organizations to integrate into the global
network. The local area network (LAN) consists of network
devices and end-user workstations, which stores users’
important data. Information security and confidentiality is
one of the most important issues when making intranet
connections between organizations and the Internet. There
are often hacked networks and organizations which have
been stolen information, etc. It may cause serious
consequences. Such attacks have increased rapidly and the
attack methods have also been constantly improved.
These attacks are aimed at computers that are available on
the Internet, with large corporate computers such as telcos,
universities, government agencies, military organizations,
banks, etc. The number of attacks on a gigantic scale (up to
100,000) is compromised. Moreover, these numbers are just
the tip of the iceberg. A great number of attacks were not
reported for a variety of reasons, including the fear of losing
credibility or simply, the project managers were not aware of
the attacks on their systems.
92% of senior IT decision-makers said their networks need
major work, while over 50% must also conduct remedial
actions for network outages several times a week or month,
if not daily, according to a study.
Therefore, the assessment, detection of vulnerabilities,
protection of the LAN is of great importance.
Vietnamese Security Network JSC – LAN Security Assessment Services
www.vsec.com.vn
VSEC’s LAN Security Assessment Services
Internal vulnerability
analysis and
penetration testing
of systems on the
corporate LAN(s) are
performed from
behind firewalls to
provide validation of
layered-security and
defense in depth.
LAN Security
Assessment
indicates
vulnerabilities that
affect large numbers
of similar systems
(e.g. desktops),and
also highlights
outlier systems that
are exceptionally
vulnerable.
VSEC’s LAN Security
Assessment Services
include internal
vulnerability
analysis and
penetration testing
to make sure that
user LANs are well
secured, including
end-user systems.
✓ A baseline of vulnerabilities and security risks is created after
scanning
✓ Best vulnerability harvesting tools, both open source and
commercial, are used
✓ False positives are eliminated and findings confirmed with manual
validation
✓ Additional vulnerabilities not found by scanning tools will be
found with manual testing
✓ Real severity is determined with penetration testing through
custom-designed and pre-existing exploits
✓ Severity of findings is classified
✓ Recommendations on remediation are provided
Vietnamese Security Network JSC – LAN Security Assessment Services
www.vsec.com.vn
LAN Security Assessment Targets
✓ Desktops
✓ Workstations
✓ Laptops
✓ LAN servers
✓ Switches
✓ Printers
✓ Other LAN Devices
✓ 100,000+ known vulnerabilities, unique
vulnerabilities from custom designs,
configurations and software
Vietnamese Security Network JSC – LAN Security Assessment Services
www.vsec.com.vn
Our Competencies
1. Auto-Scanning System combined with a Risk Management Portal
Our advanced technology in management and detection of vulnerabilities and our partners’
security solutions are highly efficient and surely pay back your investments, as proved by the
success stories of our 50+ existing customers.
Our scanning system and equipment sourced from the world’s leading security solution providers
like Rapid7, Core Security, etc. are present in many datacenters, allowing us to perform daily
security assessments for hundreds of customers across Vietnam and abroad.
2.Threat Database
VSEC has a database of security threats constantly updated, creating the power of our security
threat assessment and management system. We update this database every 15 minutes with new
security gaps and repair methods from hundreds of sources all over the world. Our technology
ensures customers are always alerted of the latest security gaps that may have impacts on their
systems.
3. Risk Alert and Management System
The Risk Management System provides risk inspection information and repair methods for network
systems. The management system is built upon application servers with high load balancing
capability; data management is hierarchized to ensure safety of system data. The system goes with
a web interface, facilitating administrators’ work. Special functionalities maximize security support:
assessment performance, risk assessment, creation of network device groups, trend monitoring,
patch information,warning configuration,attribution of authority, reporting.
4. A Team of Experts
With a team of senior experts and engineers richly experienced in information security
supervising automatic scanning, as well as manually assessing security gaps on your systems. Our
team ensures detection and comprehensive consultancy on all your system security issues.
5. Customer Support
Support by email and telephone is provided by a team well trained and internationally certified on
information security.
www.vsec.com.vn
Vietnamese Security Network Joint Stock Company
Support: support@vsec.com.vn
Sales: contact@vsec.com.vn
Phone: 04.73082299 - Hotline: 0904.861.337
Office: Court N01A - Floor M - Golden Land Building, 275 Nguyen
Trai Street, Hanoi,Vietnam

More Related Content

What's hot

Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
Rishu Mehra
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
Tammy Clark
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
arun nalam
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and IT
Komalah Nair
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
Mike Sawall
 

What's hot (20)

Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability AssessmentTALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration Testing
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and IT
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 

Similar to VSEC LAN Security Assessment Service Profile

Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
jeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
todd521
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
Erin Moore
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
Venkat Projects
 

Similar to VSEC LAN Security Assessment Service Profile (20)

VSEC Company Profile
VSEC Company ProfileVSEC Company Profile
VSEC Company Profile
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
Types of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdfTypes of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdf
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
 
Guardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital AgeGuardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital Age
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration Testing
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
 
Security Systems Vail
Security Systems VailSecurity Systems Vail
Security Systems Vail
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

VSEC LAN Security Assessment Service Profile

  • 2. Vietnamese Security Network JSC – LAN Security Assessment Services www.vsec.com.vn Why LAN Security Assessment? With interactive information demands, it is important for agencies and organizations to integrate into the global network. The local area network (LAN) consists of network devices and end-user workstations, which stores users’ important data. Information security and confidentiality is one of the most important issues when making intranet connections between organizations and the Internet. There are often hacked networks and organizations which have been stolen information, etc. It may cause serious consequences. Such attacks have increased rapidly and the attack methods have also been constantly improved. These attacks are aimed at computers that are available on the Internet, with large corporate computers such as telcos, universities, government agencies, military organizations, banks, etc. The number of attacks on a gigantic scale (up to 100,000) is compromised. Moreover, these numbers are just the tip of the iceberg. A great number of attacks were not reported for a variety of reasons, including the fear of losing credibility or simply, the project managers were not aware of the attacks on their systems. 92% of senior IT decision-makers said their networks need major work, while over 50% must also conduct remedial actions for network outages several times a week or month, if not daily, according to a study. Therefore, the assessment, detection of vulnerabilities, protection of the LAN is of great importance.
  • 3. Vietnamese Security Network JSC – LAN Security Assessment Services www.vsec.com.vn VSEC’s LAN Security Assessment Services Internal vulnerability analysis and penetration testing of systems on the corporate LAN(s) are performed from behind firewalls to provide validation of layered-security and defense in depth. LAN Security Assessment indicates vulnerabilities that affect large numbers of similar systems (e.g. desktops),and also highlights outlier systems that are exceptionally vulnerable. VSEC’s LAN Security Assessment Services include internal vulnerability analysis and penetration testing to make sure that user LANs are well secured, including end-user systems. ✓ A baseline of vulnerabilities and security risks is created after scanning ✓ Best vulnerability harvesting tools, both open source and commercial, are used ✓ False positives are eliminated and findings confirmed with manual validation ✓ Additional vulnerabilities not found by scanning tools will be found with manual testing ✓ Real severity is determined with penetration testing through custom-designed and pre-existing exploits ✓ Severity of findings is classified ✓ Recommendations on remediation are provided
  • 4. Vietnamese Security Network JSC – LAN Security Assessment Services www.vsec.com.vn LAN Security Assessment Targets ✓ Desktops ✓ Workstations ✓ Laptops ✓ LAN servers ✓ Switches ✓ Printers ✓ Other LAN Devices ✓ 100,000+ known vulnerabilities, unique vulnerabilities from custom designs, configurations and software
  • 5. Vietnamese Security Network JSC – LAN Security Assessment Services www.vsec.com.vn Our Competencies 1. Auto-Scanning System combined with a Risk Management Portal Our advanced technology in management and detection of vulnerabilities and our partners’ security solutions are highly efficient and surely pay back your investments, as proved by the success stories of our 50+ existing customers. Our scanning system and equipment sourced from the world’s leading security solution providers like Rapid7, Core Security, etc. are present in many datacenters, allowing us to perform daily security assessments for hundreds of customers across Vietnam and abroad. 2.Threat Database VSEC has a database of security threats constantly updated, creating the power of our security threat assessment and management system. We update this database every 15 minutes with new security gaps and repair methods from hundreds of sources all over the world. Our technology ensures customers are always alerted of the latest security gaps that may have impacts on their systems. 3. Risk Alert and Management System The Risk Management System provides risk inspection information and repair methods for network systems. The management system is built upon application servers with high load balancing capability; data management is hierarchized to ensure safety of system data. The system goes with a web interface, facilitating administrators’ work. Special functionalities maximize security support: assessment performance, risk assessment, creation of network device groups, trend monitoring, patch information,warning configuration,attribution of authority, reporting. 4. A Team of Experts With a team of senior experts and engineers richly experienced in information security supervising automatic scanning, as well as manually assessing security gaps on your systems. Our team ensures detection and comprehensive consultancy on all your system security issues. 5. Customer Support Support by email and telephone is provided by a team well trained and internationally certified on information security.
  • 6. www.vsec.com.vn Vietnamese Security Network Joint Stock Company Support: support@vsec.com.vn Sales: contact@vsec.com.vn Phone: 04.73082299 - Hotline: 0904.861.337 Office: Court N01A - Floor M - Golden Land Building, 275 Nguyen Trai Street, Hanoi,Vietnam