Key Service Activities
Comprehensive Security Assessment services include:
- Internal and external port scan
- An internal and external network vulnerability scan
- Asset classification assistance
- Policy reviews
- Policy awareness reviews
- In-depth regulatory and/or best practice review
- Regulation call to assist with self-assessment
- Network topology review
- C2C portal system setup and implementation
- Internal network vulnerability review
- False-positive reduction of scan data through manual third-party review
- Validation of false-positive review through manual third-party analysis
- Advanced manual vulnerability analysis to determine vulnerability severity
- Security countermeasure review (antivirus, firewall, access control, etc.)
When conducted onsite, the assessment will also include:
- Identify wireless access points, including rogue
- Physical security review
- Dumpster diving at the main facility
- Offsite consultation and remediation strategy
Assessment Result
Assessment results are provided in an extensive report containing:
- Project overview
- Comprehensive security assessment methodology
- Executive summary
- Prioritized internal and external network risks and recommendations
- Regulatory compliance analysis
- Information security policy analysis
- Executive-level PowerPoint of assessment
- Differential reporting
- Appendix
Other Services
On-going services, via our web-based portal, include:
- On-demand generation of comprehensive reports
- Unlimited client-executed scans with third-party remote false positive validation
- Regulatory compliance and security assessment evaluation metrics through self-assessment
- Automated policy development software and policy management
- Automated training development software and training management, including access to security awareness training content