Detect hidden weaknesses by proactively identifying insecure architecture and controls, misconfigurations, technical vulnerabilities, and mistakes. Be confident that sufficient security controls are implemented and are working as expected.

  • Identify Risks and security gaps before threats are escalated.
  • Optimize existing security Controls to maximize protection level.
  • Review Susceptibility to ransomware attacks.
  • Cost Savings on additional security controls by optimizing current ones.

Review Security Controls and Measure Quality by Collecting Relevant Evidence.|

Cyber Security Controls Assessment includes the review of core security preventative and detection controls. These include the analysis of the following key security technologies, including Firewalls/UTM, Checks on IPS, Content Filtering and Anti-Malware, Endpoint Security, Data Loss Prevention (DLP), and Ransomware Susceptibility Checks.

The Challenge

Organisations often do not have the full picture when it comes to the protection provided by their security controls.

The Solution

For a full review of your core security preventative controls, receive a 5-, 8, or 10-Day offering, depending on your needs and Firewalls.

Key Features

Email Security Gateway

Email Security Gateway

  • Assessment of email, endpoint, and network DLP policies.
  • False positive/ false negative management.
  • Validate coverage of Data Leakage channels.
  • High-level architecture analysis.

Perimeter and Content Security Solution

Perimeter and Content Security Solution

  • Anti-Malware (check policies, configurations).
  • IPS (check policies, signatures applied).
  • URL Content Filtering (Check on high-risk user browsing policies & misconfigurations of policies).

Endpoint Security

Endpoint Security

  • Endpoint attack surface hardening recommendations.
  • Check policies for Endpoint security solutions.
  • Check for misconfigurations & technical mistakes.
  • Compare configuration with vendor recommendations.

Firewall/UTM

Firewall/UTM

  • (Overly Permissive Rules, High-Level Architecture and Configuration Gaps)
  • High-level architecture analysis.
  • Check for misconfigurations & technical mistakes.
  • Check rules to find overly permissive rules & never used rules.

Ransomware Susceptibility Checks

Ransomware Susceptibility Checks

  • Review against SecurityHQ’s Zero Trust x40 Checks for Ransomware protection.
  • Check that current security controls provide protection against ransomware and this functionality is enabled and configured properly.

Business Intelligence Analytics

Business Intelligence Analytics

  • Present Risks
  • Posture Issues
  • Pattern User Violations