Enterprise Security Assessment & Vulnerability Analysis
Our skillful specialists conduct a review of the security of your enterprise. They also conduct a vulnerability scan of your network. A report is provided on the results of the assessment and analysis, along with proposed actions for remediation.
Target Customers: This service is for enterprises of all sizes.
Process
The enterprise security assessment and vulnerability analysis is conducted in three steps.
Step 1: Security Assessment Cipher Solutions conducts an interview with you to discuss the entire security posture. This includes a detailed interview of the various security aspects of customer environment and security posture. We use the U.S. Government's National Institute of Technology (NIST) standards, specified in NIST SP 800-53 Rev 4, Security and Privacy Controls for Federal Systems and Organizations, April 2013.
Step 2: Network Security Scanning Our team conducts basic passive scanning of your network. This is to map the network and identify any network openings. No attempt is made to perform any intrusions or other actions (such as penetration testing). This basic external scan of your network helps identify potential openings for a security attack.
Step 3: Security Assessment Report Generation & Review We develop a report outlining our findings. This includes a prioritized list of potential vulnerabilities and weaknesses. In most cases, we recommend remediation actions and also review the report with you.
|