[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-7seebqq’]
A Real World Assessment of Your Internal IT Security Risks
[/av_textblock]
[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ av_uid=’av-74d52aa’]
[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=” av_uid=’av-6ojudn6′]
[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-66vxaeq’]
Why Do This?
- You have to (compliance)
- You never have (curiosity)
- You should (due diligence)
What is This?
An expert review and testing of your internal IT security (behind the firewall). We assess how you have architected the network and perform technical scanning to look for the more technical vulnerabilities.
When Should This be Done?
- At least annually
- After changes to your configurations
- After changes to your hardware
- As you are required to
- As often as you want
[/av_textblock]
[/av_one_half]
[av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=” av_uid=’av-5s0svw2′]
[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-59ahc4y’]
Who Conducts the Assessment?
Seasoned information security professionals. FRSecure performs hundreds of these assessments annually; each customized to the organization we assess.
What Regulatory Organizations Require or Promote this Type of Assessment?
- GLBA (Banking)
- NCUA (Credit Unions)
- HIPAA (Healthcare)
- SOX (Financial)
- PCI (Credit Card)
- SSAE16 (SOC 2)
What Other Types of Security Assessments Should I Consider?
Full Information Security Assessment including Administrative, Physical, Internal Technical and External Technical security.
[/av_textblock]
[/av_one_half]
[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ av_uid=’av-4qosywi’]
[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-g63rn6′]
How Exactly is Internal Vulnerability Assessment Done?
[/av_textblock]
[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ av_uid=’av-3wcrp4i’]
[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-3a1yt0y’]
A Review of the Network Architecture and Management Practices
- Network Connectivity
- Remote Access
- Directory Services
- Servers and Storage
- Workstations
- Mobile Devices
- Logging and Alerting
- Vulnerability Management
- Backup and Disaster Recovery
[/av_textblock]
[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ av_uid=’av-31e63iq’]
[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-x63w2′]
Vulnerability Scanning on the Internal Network
- Tests for password policies, system permissions, required auditing and system settings that are common in all networks
- Tests for user auditing settings, such as their password complexity and logging access failures and logons that are common in all networks
- Tests conducted against a database of 47,000+ known vulnerabilities
- Tests for the existence of sensitive files and data leakage
- Tests against known good configurations
[/av_textblock]
[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ av_uid=’av-1xf7jjm’]
[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-1ogggia’]
Analysis of the Collected Vulnerability Data
- Risk analysis and quantification
- Removal of insignificant data from results
- Prioritization of the risks identified
- Recommendations for remediation and ongoing maintenance
[/av_textblock]
[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ av_uid=’av-17wluaa’]
[av_textblock size=” font_color=” color=” admin_preview_bg=” av_uid=’av-w2smfm’]
How do I Get a Quote?
Talk to FRSecure to make sure this is the right kind of testing for you as there are many different types of this testing that you may need to consider. Have ready the number of workstations, users and staff on your network.
[/av_textblock]
[av_image src=’https://frsecure.com/wp-content/uploads/2016/11/eCommerce-blog-CTAs-vuln-scan.png’ attachment=’15615′ attachment_size=’full’ copyright=” caption=” styling=” align=’center’ font_size=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ animation=’no-animation’ hover=” appearance=” link=’manually,https://frsecure.com/services/vulnerability-assessment/’ target=’_blank’ title_attr=” alt_attr=” lazy_loading=’disabled’ id=” custom_class=” av_element_hidden_in_editor=’0′ av_uid=’av-jtfvr5d9′ admin_preview_bg=”][/av_image]