SALES: 888.519.8111 SUPPORT: 888.414.8111
LIVE Service Desk Stats for 4/27/17 as of 5:01 AM EST:
ASA - 10 sec(s) | MTTR - 27 min(s)
First Name*
Business Size*
Email Address*
What is your IT Service Need?*

Security Vulnerability Assessments

 

IT Security Assessments Protect Your Network

To enhance your security posture, you need transparency into your organization. You cannot protect what you can’t see.

Our security vulnerability assessments and network penetration testing provide the transparency your business needs to determine your current security baseline with key, actionable recommendations to harden your security posture. Learn more about our assessments below to find out which one is right for your business.

Security Vulnerability Assessments Icon
White Ribbon SGap Security Gap Assessment

Our Security Gap Assessment provides your business with an in-depth look at your current security posture, and provides a customized strategic roadmap comprised of short- and long-term milestones, as well as a plan of action to achieve your security goals.

Conducted by certified security specialists, this comprehensive assessment evaluates your environment based on 23 unique points of inspection across 5 holistic categories. Once complete, we provide you with a complete report that includes:

  • Initial baseline of your information security landscape tailored to your business requirements and objectives
  • Evaluation of core infrastructure’s susceptibility to external access or disruption
  • Comparison of how your environment stacks up with your industry's standards and best practices
  • Results of a personally-identifiable information (PII) scan
  • Numerical security maturity scores
  • Prioritized recommendations and roadmap for success
Security Gap Assessment Image
Colored Ribbon VA Vulnerability Assessment

Enhanced transparency into the internal and external perimeters of your network is critical in determining where your security needs to be strengthened. With our Vulnerability Assessment, you receive a valuable baseline for determining appropriate defenses and remediation activities to further secure your network, as well as a customized report outlining key actions.

Our certified virtual Chief Information Security Officers (vCISO) and security analysts follow comprehensive vulnerability assessment steps that:

  • Scan for external and internal vulnerabilities
  • Perform a firewall security audit
  • Perform system patch audits
  • Compare results to system hardening benchmarks
  • Use the industry-standard Common Vulnerability Scoring System (CVSS) for comparison
Security Vulnerability Assessment
White Ribbon PenTest Penetration Testing

Dataprise offers Security Penetration Testing to assist your business in finding vulnerabilities that an attack could exploit to either gain control of your network or obtain sensitive information. During a security penetration test, our security analysts combine both manual and automated techniques to ensure your sensitive data is protected and compliance requirements are met. After the test, we provide a comprehensive report detailing our results and insight on how to better secure your business against real-life attacks.

We offer three different approaches to Penetration Testing to fit your organization’s needs:

  • White Box Testing: We have full access to your infrastructure when testing

This type of testing will simulate an attacker who has been collecting information about your company and may have gained access through many methods including an undisclosed or new and unpatched (zero-day) vulnerability. This test will highlight weaknesses in your defense in depth strategy, monitoring systems, patching policies, and system/networking configurations.

  • Gray Box Testing: We have partial knowledge of your infrastructure when testing

Grey box testing is a hybrid approach to the white box and black box testing paradigms. This testing simulates a threat that has gathered information about your company and network that can be assumed to be acquired by an attacker with a moderate skill set and time. This test will highlight weaknesses in your defense in depth strategy, perimeter security, and information leakage.

  • Black Box Testing: We test your network without having any knowledge of your IT infrastructure

Black box testing allows us to simulate a threat that has little information regarding your business and infrastructure. This testing highlights what information a company is unintentionally leaking which would allow an attacker to map and attack the target network.

Security Penetration Test Image
Perimeter Ribbon Perimeter Edge Assessment

Similar to locking windows and doors to protect your home, securing your network perimeter is a key measure to guard your network from outside intruders.

Our Perimeter Edge Assessment is designed to help you better understand your threat landscape and how to secure your firewall. This assessment scans your externally-accessible technology firewall as it relates to current industry best practices and known threats. From this data, we create a customized report for your business that includes:

  • Overview of key findings
  • External vulnerability scan
  • Firewall security audit
Security Perimeter Assessment Image

Looking For Other Tests/Audits?

Contact us today to learn more about the other types of tests and audits we provide, such as:

  • Policy Gap Assessments
  • Compliance Assessments (e.g., HIPAA, PCI, ISO, NIST 800-171)
  • PII Assessments
  • And more!

Contact Us To Get Started Winning With IT Today!

If your business is looking to partner with a local IT support company that will learn the intimate details of your business technology and process, while also having the experience to manage and advise you on your day-to-day technology challenges, just fill out our contact form below and one of our consultants will contact you shortly.

 
  You have 2000 characters left.