
An assessment is a tool meant to clearly identify weaknesses in a system. It must be understandable, it must be complete, and it must be correct.
Network Security Assessments
-
Reasons For An Assessment:
Securing a network against malicious attackers is hard work, and you need to be sure that your security measures have addressed all vulnerabilities. To do this you need to have a fresh set of knowledgeable eyes asses the threats to your network, the attack surface you present, and ultimately your vulnerability. Only by knowing your true security posture can you build a stronger, more secure network.
In addition to simply securing your network, today's businesses have to comply with numerous laws and regulations. Audits, Assessments or Penetration Tests are often required. We feel your pain and want to make sure that you can not only comply with the laws and regulations, but truly protect the investment you have in your data.
-
Assessment Goals:
An assessment is a tool meant to clearly identify weaknesses in a system. It must be understandable, it must be complete, and it must be correct. We at Astrum Labs take pride in the assessments we produce and strive to provide you with a list of vulnerabilities and recommendations that is comprehensive with no false-positives, that is clear and understandable, and that provides enough information for you to properly identify, test, and remediate the issues that were found.
Assessment Types
-
External Network Assessment
Any network connected to the Internet faces constant attacks from bad actors. We want to find, and fix, any vulnerabilities before the bad guys do.
-Internet Information-
We will scour the internet looking for sensitive information that an attacker could use, and identify common issues that could make your network less robust.-Services Testing-
The doorways into your network are the services you expose to the internet. We will probe these services to ensure that the doors are properly locked.-Web Presence-
Your website is how the world finds you, and the first impression they get. We will test your site to make sure that only you can make this impression, not some hacker. -
Internal Network Assessment
Historically, networks have been designed with a hard outer shell, but a squishy interior. Modern attacks take advantage of this fact and attempt to gain a foothold inside and attack from there.
-Patch Management-
Keeping your systems up to date is the best way to address the new vulnerabilities that are discovered every day. We will ensure that you know of any systems that have fallen behind.
-Service Vulnerabilities-
Often internal services are configured just enough to get them up and running. We will look for configuration errors that may allow an attacker easy access to your data.
-Design Flaws-
Network design can play a significant role in stopping or limiting an attack. We will examine your network and suggest ways your network design can make your network more resilient. -
Social Engineering
The most secure network is only as strong as its weakest component. This link is often the human operator.
-Phishing-
Phishing scams are all around us, but most users lack the training and the experience to effectively identify and react to these threats. We will perform a phishing attack to test your technical countermeasures, and help identify those users that are most susceptible, allowing training efforts to have the most impact on your security.
If you require further information about our products and services or would like to express your interest, please do not hesitate to contact us.