Assess the configuration parameters of your Firewall/WAF matrix. Routers/Switches. DLP ruleset. AD Group policies. Web Server. Application Servers. Databases. Virtual Infrastructure. Desktops/Laptops/mobile.

Typical VA Tools, scan for known vulnerabilities and not assess the underlying configuration for infosec vulnerabilities... before the hackers/viruses come knocking.. Call us!

Using a potent mix of commercial tools, inhouse developed scripts and an automated MSS portal, our Secure Configuration Assessment services identifies vulnerabilities in the underlying configuration of your infrastructure such as the adequacy of the matrix in your Firewall/Waf, adequacy of your DLP security matrix, configurations of your routers, switches, servers, VPNs, NAC, Mainframes and wide-range of platforms through its adaptive NextGen Secure Configuration Assessment Approach.

Our NexGen approach to Secure Configuration assessment and management:

Take aways from this first level of preventive and detective control:

  • Executive Reports summarizing by business area, assets and services.
  • Remediation Reports with detailed steps for administrators.
  • Regulatory Compliance (PCI, HIPAA, GLBA, SOX, FISMA, RBI and COBIT requirements) and Policy Violation reports.
  • Trends report to monitor progress.
  • CIO Dashboard (Security Monitoring Dashboard Only)
  • Vulnerability Management portal
  • CxO dashboard.
  • Two-factor authentication, SSL data encryption & real time DR backups.
  • Online Submission and tracking of VA/PT tasks.
  • Customizable reports available only in secure repository with encryption
  • Assign vulnerabilities to team member for closure with time limit.
  • Team members can mark vulnerabilities as “Closed” and upload evidence.
  • Track closure of vulnerabilities identified.