Security Assessment and Reviews:
Our Professional Security Services team delivers comprehensive, enterprise-wide security assessments and reviews. Our team of expert consultants can show you how to identify and implement security best practices to reduce current and future threats to your critical business assets.
Penetration Testing:
Our team of security experts provide an external perspective of the vulnerabilities that are Internet-accessible and exploitable. The combination of Accu's assessment technology, open source and commercial tools, and our process will validate all security controls. The Business Case: The vulnerabilities we find… are exploitable by anyone in the entire world.
Database Risk & Vulnerability Assessments :
Our Cyber Security Experts provide you with accurate and in-depth risk assessments of your database systems. Mission critical data and information, the crown jewels of your organization, are stored in databases 24/7. These databases are quickly becoming the favorite target of malicious insiders and external attackers. We leverage industry leading technology to give your organization a snapshot of their database vulnerabilities and misconfigurations while providing the expertise to fix and remediate these threats.
Firewall and Perimeter Assessments:
Perimeter and network security is the natural first line of defense for most organizations. Firewalls are now coupled with gateway filtering appliances and intrusion prevention systems; however, poorly configured systems, out-of-date policies and deployment architectures can lead to a false sense of security. The Ciphent Security Team will analyze all perimeter components in detail, to ensure that every ACL, firewall rule, and IPS signature is properly enabled to prevent the myriad of external attacks.
Log Analysis:
Event and log data is difficult to capture, analyze, and react to in real-time without the proper technology and business processes. Our Log Analysis Services’ include reviewing a one-time snapshot of log files, reviewing server configurations and their audit and logging configurations, compliance log reviews, and incident response services. |
|