|
As part of our assessment services we conduct
an end-to-end analysis of your networked environment
and current information assurance and security
posture. We inspect your facilities and their
surroundings, talk with employees, review architecture
and configuration documentation, and analyze
connectivity and access controls and study security
policies and goals in the context of your business
needs. This is a systematic baseline identification
of all network devices and resources, and the
establishment of evaluations for all groups
of data residing on the network. Assessment
turns the general description of the network
into measurable sets of data that can then be
used to design an effective security policy
and infrastructure. You get a thorough identification
of vulnerabilities and recommendation of solutions
and improvements to help set priorities for
investment.
|
|