|HOME|

Play Security.





Service Lines       
  IT Consulting
  Marketing Strategies
  Application Outsourcing
  Data Recovery
  Computer Forensics
  Network Security Assessments


Network Security Assessments

What actions can I take today that will most effectively reduce my risk with the fewest resources?

What critical systems on my network are exposed to insecure networks?

How can I configure my network countermeasures to reduce risk?

Anybody can run freely available tools, download security checklists from the Internet and achieve a level of results, but are those results a true indication of the risks in your environment? Have all the major risks been identified?

In performing such work for our clients, the planning, analysis and investigation is driven by the skills of our people.

In large enterprise networks, it's not uncommon to have ten or more vulnerabilities on each host, even with a remediation process in place. Consequently, IT teams can easily be faced with tens or even hundreds of thousands of vulnerabilities across the network, with little indication of which present the most overall network risk.

Network Security Assessments Include...

  • Analysis of Risk Vulnerabilities: We present the results of the analysis in reports that display the calculated risk at the vulnerability, host, application, and network level. The foundation for these calculations is the risk that each vulnerability presents to the host where it is found. This metric is calculated using a combination of the vulnerability score, the host's asset value, and the ability of the related attack to reach the vulnerability. This risk metric provides effective prioritization of vulnerabilities, enabling IT staff to focus on those most likely to be attacked based on their exposure to networks where attacks may originate.

  • Topology Discovery: We use multiple methods to determine the topology of the network and the presence of countermeasures, such as firewalls and routers. The first method, network tracing, involves mapping the path of IP packets to the specific port and application where a vulnerability exists. The second method consists of gathering and analyzing the configuration of network devices that route and block packets, such as routers and firewalls. Both methods are complementary and can be used independently or in unison, providing the most accurate topology intelligence available and ensuring compatibility with any network environment.

  • Assessing Threat Sources: In addition to pinpointing the vulnerabilities that put your network most at risk, we also provide insight into the amount of risk originating from each network. This intelligence enables IT staff to make informed decisions about the placement and configuration of countermeasures, ultimately creating a more secure network. Optimal use of countermeasures also reduces the number of vulnerabilities visible to insecure networks, reducing actual network risk without the time-consuming task of applying patches to affected system.

  • Effective Remediation Through Prioritization: We focus on remediating vulnerabilities that introduce the highest risk to the business.

  

  
   HOME  |  About Us  |  HIPAA Compliant