Specialized in IT Solutions & Management Consulting Services

It Vulnerability Management

Vulnerability is “A weakness of an asset or group of assets that can be exploited by one or more threats” (source: ISO 17799:2005). A vulnerability is more than just a technical issue, it can be a weakness in any asset, process, or a policy violation which can be exploited to compromise security. The Common vulnerabilities are un-patched or out of date software, Default or weak system passwords, untrained users (lack of security awareness) and Weaknesses in facilities or infrastructure.

We perform a detailed study of the existing Vulnerability Management program and benchmark it with the industry best practices to lay down a meaningful report that helps in understanding the gaps and recommend the transition to   transforms performance of your Vulnerability Management program to a next level. We consider Servers, Firewall, Routers, Switches, Wireless Networks and VOIP Networks for the Vulnerability Management program.

Benefits

Reduces risk by more effectively allocating controls

Improved IT assurance that enables stable, effective and efficient business operations

Increases compliance with regulatory issues (e.g., SOX, HIPAA, PCI) by enhancing the control network

Creates increased transparency with management by collecting and automating reports for executive dashboards

Improves management of IT assets and processes

Providing relevant information about Vulnerability Management Program to trading partners, customers, and other organizations with whom you interact for operational or commercial reasons

Approach

Infrastructure Vulnerability Assessment

Identify Vulnerabilities

Assign risk rating for every identified vulnerability

Provide remediation steps for every identified vulnerability

Infrastructure Penetration Test

Identified vulnerabilities are exploited using various tools and manual techniques

Assign risk rating for every identified vulnerability

Provide remediation steps for every identified vulnerability

Configuration Review/Technical Audit

Device in scope is manually inspected and reviewed

Identify gaps with the industry hardening guidelines and international best practices

Provide remediation steps for each identified gap

Network Architecture Review

Review the network architecture from security perspective

Identify security anomalies from design perspective

Define revised network diagram with recommendations and provide appropriate remediation

Awareness and training program to key IT operations staff