1. Technical Security Assessment Tests: Features
ü Network
Security
Assessment
Tailored
Security
Audit,
Assessment
&
C ompliance
services:
ü Host
Security
Assessment
ü Web
Applica=on
Security
Assessment
ü Simulate
real-‐world
a;acks
to
iden=fy
vulnerabili=es
and
threats
ü Database
Security
Assessment
ü Deliver
priori=zed
recommenda=ons
for
mi=ga=ng
iden=fied
risks
ü Penetra=on
tes=ng
/
ethical
hacking
ü Provide
best
prac=ces
for
relevant
security
architecture
components
ü Applica=on
Security
Assessment
ü Iden=fy
specific
areas
of
security
strengths
and
weaknesses
in
the
assessed
infrastructure
ü Source
code
review
ü Provide
in-‐depth
knowledge
transfer
illustra=ng
specific
vulnerabili=es
iden=fied
and
best
prac=ces
for
remedia=on
Enterprise Security
Auditing
Security
Audit
Rollout
Benefits
ü Verify
the
effec=veness
of
protec=on
mechanisms
implemented
ü Obtain
a
clear
image
of
your
current
exposure
Network
configura=ons
ü Gain
visibility
of
your
exploitable
weaknesses
and
vulnerabili=es
Applica=on
security
mechanisms
ü Obtain
o
list
of
recommenda=ons
of
clear
ac=ons
towards
mi=ga=ng
security
risks
Server
configura=ons
ü Reduce
patching
efforts
by
iden=fying
and
defining
the
weaknesses
and
vulnerabili=es
Employee
security
awareness
ü Reduce
the
security
risks
associated
with
I T
Systems
and
help
demonstrate
due
diligence
ü Test
the
ability
of
system
defenders
to
detect
and
respond
to
a;acks
ü Obtain
a
reliable
basis
for
investments
in
security
personnel
and
technology
ü Required
by
I SO
27001,
P CI
D SS
etc.
ü As
part
of
risk
assessment
for
risk
iden=fica=on
and
quan=fica=on
ü As
part
of
ongoing/periodic
security
assessment
ü Before
a
new
system
is
put
in
produc=on
ü In
the
development
phase
of
a
new
system