Your SlideShare is downloading. ×
0
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Security Readiness Profile
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security Readiness Profile

471

Published on

We'll help reveal the vulnerabilities in your business networks by comparing them to industry best practices

We'll help reveal the vulnerabilities in your business networks by comparing them to industry best practices

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
471
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Security Readiness Profile An Objective View of Your Network Security
  • 2. What is a Security Readiness Profile? A pds2k.com Security Readiness Profile compares your physical network, operating policies and procedures against industry standards. This reveals the vulnerable areas in your business operations that need immediate attention.
  • 3. The First Steps <ul><li>On-site review of your network security by a pds2k.com technician </li></ul><ul><li>Meeting with you and your IT staff to review initial findings </li></ul><ul><li>Develop a written summary of findings, with recommendations to improve security </li></ul><ul><li>Meeting with you and your IT staff to review the summary report and recommendations </li></ul>
  • 4. The Elements Reviewed in a Security Readiness Profile <ul><li>Data Access </li></ul><ul><li>Firewalls </li></ul><ul><li>Internet </li></ul><ul><li>Virtual Private Networks (VPN) </li></ul><ul><li>Network Routers </li></ul><ul><li>Access and Authentication </li></ul><ul><li>Virus Management </li></ul><ul><li>LAN Security </li></ul><ul><li>Backup and Contingency </li></ul><ul><li>Disaster Recovery </li></ul>
  • 5. Section 1: Data Access <ul><li>Reviews password security practices; </li></ul><ul><li>File protection mechanisms; </li></ul><ul><li>PC/Workstation security, and; </li></ul><ul><li>Security policies for data archiving and disposal </li></ul>
  • 6. Section 2: Firewalls <ul><li>Reviews firewall setup and redundancy; </li></ul><ul><li>Security configurations, such as packet filters and proxies; </li></ul><ul><li>Monitoring practices; and </li></ul><ul><li>In-bound and out-bound Internet security </li></ul>
  • 7. Section 3: Internet <ul><li>Reviews Gateway architecture; </li></ul><ul><li>Internet Acceptable Use Policy (IAUP); use of Proxy Services, and; </li></ul><ul><li>Monitoring policies and procedures; </li></ul><ul><li>Provides recommendations to increase Internet security to prevent intrusion. </li></ul>
  • 8. Section 4: Virtual Private Networks (VPN) <ul><li>Reviews current VPN security policy and enforcement practices </li></ul><ul><li>Reviews VPN authentication mechanisms and monitoring </li></ul><ul><li>Provides recommendations to maintain fast, reliable, secure communications at all times </li></ul>
  • 9. Section 5: Network Routers <ul><li>Reviews physical security of Network routers and preventative maintenance practices </li></ul><ul><li>Reviews password management, interactive access controls, management services and logging </li></ul><ul><li>Provides recommendations to prevent catastrophic failure of your network </li></ul>
  • 10. Section 6: Access & Authentication <ul><li>Reviews PC/Workstation security; </li></ul><ul><li>User access controls; </li></ul><ul><li>OS and software update policies; </li></ul><ul><li>Logging and data collection mechanisms, and; </li></ul><ul><li>Backup configurations </li></ul>
  • 11. Section 7: Virus Management <ul><li>Reviews virus detection mechanisms; </li></ul><ul><li>Anti-Virus software update schedules; </li></ul><ul><li>Policies regarding removable media devices, and; </li></ul><ul><li>Procedures for investigating, reporting and documenting virus incidents </li></ul>
  • 12. Section 8: LAN Security <ul><li>Reviews your organization’s LAN security and policies </li></ul><ul><li>Defines our proven method to Harden/Secure, Prepare, Detect and Respond to LAN security issues before they become a problem </li></ul>
  • 13. Section 9: Backup & Contingency <ul><li>Reviews the security of your backup systems, capacity and strategies </li></ul><ul><li>Reviews your protection mechanisms for backup and verification </li></ul><ul><li>Provides recommendations to develop a business continuity plan </li></ul>
  • 14. Section 10: Disaster Recovery <ul><li>An assessment of your vulnerabilities to both natural and man-made disasters </li></ul><ul><li>Determines whether your Disaster plan can effectively meet your company’s projected needs </li></ul><ul><li>Provides recommendations to update and test your Disaster plan </li></ul>
  • 15. The Final Steps <ul><li>Meeting with you and your IT staff to review the SRP report and our recommendations </li></ul><ul><li>Prioritize actions to provide an efficient, reliable and secure business network </li></ul><ul><li>Determine the amount of assistance required from our technical team to make it happen </li></ul>
  • 16. About <ul><li>Progressive Data Systems, Inc. was incorporated in 1990 by Bill Correll. For the next five years, pds2k.com continued to expand and serviced almost 600 clients. </li></ul><ul><li>Between 1998 and 2001, the company changed focus to become an Internet service provider, and concentrated on providing computer networking consulting and service to medium-sized business, town offices, and social service agencies. </li></ul><ul><li>Since 2003, pds2k.com has concentrated on finding ways to bring more value to their network clients by continuing to develop expertise in all areas of Internet and network security consulting. </li></ul>

×