ݺߣ

ݺߣShare a Scribd company logo
Technical Security Assessment Tests:                                                                  Features

                                        ü   Network	
  Security	
  Assessment	
                                                              Tailored	
  Security	
  Audit,	
   Assessment	
  &	
  C ompliance	
  services:
                                        ü   Host	
  Security	
  Assessment	
                                                                 	
  
                                        ü   Web	
  Applica=on	
  Security	
  Assessment	
                                                    ü Simulate	
  real-­‐world	
  a;acks	
  to	
  iden=fy	
  vulnerabili=es	
  and	
  threats	
  	
  
                                        ü   Database	
  Security	
  Assessment	
                                                             ü Deliver	
  priori=zed	
  recommenda=ons	
  for	
  mi=ga=ng	
  iden=fied	
  risks	
  	
  
                                        ü   Penetra=on	
  tes=ng	
  /	
  ethical	
  hacking	
                                                ü Provide	
  best	
  prac=ces	
  for	
  relevant	
  security	
  architecture	
  components	
  
                                        ü   Applica=on	
  Security	
  Assessment	
                                                           ü Iden=fy	
  specific	
  areas	
  of	
  security	
  strengths	
  and	
  weaknesses	
  in	
  the	
  assessed	
  infrastructure	
  	
  	
  
                                        ü   Source	
  code	
  review	
                                                                       ü Provide	
  in-­‐depth	
  knowledge	
  transfer	
  illustra=ng	
  specific	
  vulnerabili=es	
  iden=fied	
  and	
  best	
  prac=ces	
  for	
  remedia=on	
  




                                                                                                                        Enterprise Security
                                                                                                                             Auditing



Security	
  Audit	
  Rollout	
                                                                                                                Benefits
	
                                                                                                                                            	
  
ü Verify	
  the	
  effec=veness	
  of	
  protec=on	
  mechanisms	
  implemented	
  	
                                                         ü     Obtain	
  a	
  clear	
  image	
  of	
  your	
  current	
  exposure	
  
        Network	
  configura=ons	
  	
                                                                                                        ü     Gain	
  visibility	
  of	
  your	
  exploitable	
  weaknesses	
  and	
  vulnerabili=es	
  
        Applica=on	
  security	
  mechanisms	
  	
                                                                                           ü     Obtain	
  o	
  list	
  of	
  recommenda=ons	
  of	
  clear	
  ac=ons	
  towards	
  mi=ga=ng	
  security	
  risks	
  
        Server	
  configura=ons	
  	
                                                                                                         ü     Reduce	
  patching	
  efforts	
  by	
  iden=fying	
  and	
  defining	
  the	
  weaknesses	
  and	
  vulnerabili=es	
  
        Employee	
  security	
  awareness	
  	
                                                                                              ü     Reduce	
  the	
  security	
  risks	
  associated	
  with	
  I T	
  Systems	
  and	
  help	
  demonstrate	
  due	
  diligence	
  
ü Test	
  the	
  ability	
  of	
  system	
  defenders	
  to	
  detect	
  and	
  respond	
  to	
  a;acks	
  	
  
ü Obtain	
  a	
  reliable	
  basis	
  for	
  investments	
  in	
  security	
  personnel	
  and	
  technology	
  	
  
ü Required	
  by	
  I SO	
  27001,	
   P CI	
  D SS	
  etc.	
  	
  
ü As	
  part	
  of	
  risk	
  assessment	
  for	
  risk	
  iden=fica=on	
  and	
  quan=fica=on	
  	
  
ü As	
  part	
  of	
  ongoing/periodic	
  security	
  assessment	
  	
  
ü Before	
  a	
  new	
  system	
  is	
  put	
  in	
  produc=on	
  	
  
ü In	
  the	
  development	
  phase	
  of	
  a	
  new	
  system	
  

More Related Content

Enterprise security auditing

  • 1. Technical Security Assessment Tests: Features ü Network  Security  Assessment   Tailored  Security  Audit,   Assessment  &  C ompliance  services: ü Host  Security  Assessment     ü Web  Applica=on  Security  Assessment   ü Simulate  real-­‐world  a;acks  to  iden=fy  vulnerabili=es  and  threats     ü Database  Security  Assessment   ü Deliver  priori=zed  recommenda=ons  for  mi=ga=ng  iden=fied  risks     ü Penetra=on  tes=ng  /  ethical  hacking   ü Provide  best  prac=ces  for  relevant  security  architecture  components   ü Applica=on  Security  Assessment   ü Iden=fy  specific  areas  of  security  strengths  and  weaknesses  in  the  assessed  infrastructure       ü Source  code  review   ü Provide  in-­‐depth  knowledge  transfer  illustra=ng  specific  vulnerabili=es  iden=fied  and  best  prac=ces  for  remedia=on   Enterprise Security Auditing Security  Audit  Rollout   Benefits     ü Verify  the  effec=veness  of  protec=on  mechanisms  implemented     ü Obtain  a  clear  image  of  your  current  exposure     Network  configura=ons     ü Gain  visibility  of  your  exploitable  weaknesses  and  vulnerabili=es     Applica=on  security  mechanisms     ü Obtain  o  list  of  recommenda=ons  of  clear  ac=ons  towards  mi=ga=ng  security  risks     Server  configura=ons     ü Reduce  patching  efforts  by  iden=fying  and  defining  the  weaknesses  and  vulnerabili=es     Employee  security  awareness     ü Reduce  the  security  risks  associated  with  I T  Systems  and  help  demonstrate  due  diligence   ü Test  the  ability  of  system  defenders  to  detect  and  respond  to  a;acks     ü Obtain  a  reliable  basis  for  investments  in  security  personnel  and  technology     ü Required  by  I SO  27001,   P CI  D SS  etc.     ü As  part  of  risk  assessment  for  risk  iden=fica=on  and  quan=fica=on     ü As  part  of  ongoing/periodic  security  assessment     ü Before  a  new  system  is  put  in  produc=on     ü In  the  development  phase  of  a  new  system