|
Service Lines
IT Consulting
Marketing Strategies
Application Outsourcing
Data Recovery
Computer Forensics
Network Security Assessments
|
|
Network Security Assessments
What actions can I take today that will most effectively reduce my risk with the fewest resources?
What critical systems on my network are exposed to insecure networks?
How can I configure my network countermeasures to reduce risk?
Anybody can run freely available tools, download security checklists from the
Internet and achieve a level of results, but are those results a true indication
of the risks in your environment? Have all the major risks been identified?
In performing such work for our clients, the planning, analysis and
investigation is driven by the skills of our people.
In large enterprise networks, it's not uncommon to have ten or more vulnerabilities
on each host, even with a remediation process in place. Consequently, IT teams can easily
be faced with tens or even hundreds of thousands of vulnerabilities across the network,
with little indication of which present the most overall network risk.
Network Security Assessments Include...
-
Analysis of Risk Vulnerabilities:
We present the results of the analysis in reports that display
the calculated risk at the vulnerability, host, application, and network level.
The foundation for these calculations is the risk that each vulnerability presents to the host
where it is found. This metric is calculated using a combination of the vulnerability
score, the host's asset value, and the ability of the related attack to reach the
vulnerability. This risk metric provides effective prioritization of vulnerabilities,
enabling IT staff to focus on those most likely to be attacked based on their
exposure to networks where attacks may originate.
-
Topology Discovery:
We use multiple methods to determine the topology of the network
and the presence of countermeasures, such as firewalls and routers. The first method,
network tracing, involves mapping the path of IP packets
to the specific port and application where a vulnerability exists.
The second method consists of gathering and analyzing the configuration of network devices that
route and block packets, such as routers and firewalls. Both methods are complementary
and can be used independently or in unison, providing the most accurate topology
intelligence available and ensuring compatibility with any network environment.
-
Assessing Threat Sources:
In addition to pinpointing the vulnerabilities that put your network most at risk,
we also provide insight into the amount of risk originating from
each network. This intelligence enables IT staff to make informed decisions about the
placement and configuration of countermeasures, ultimately creating a more secure network.
Optimal use of countermeasures also reduces the number of vulnerabilities visible to
insecure networks, reducing actual network risk without the time-consuming task of
applying patches to affected system.
-
Effective Remediation Through Prioritization:
We focus on remediating vulnerabilities that introduce the highest risk to the business.
|