Vectra can provide experienced security professionals to undertake security reviews, risk assessments and disaster recovery planning.
The information maintained by your organisation represents a vital business asset that must be secured from both internal and external threats. Malicious users can employ a combination of attack vectors to attempt to gain access to your systems via your public Internet face and via internal weaknesses. To assist in the protection of this organisational information Vectra Corporation offers a complete Security Review service that will provide you with a snapshot of your security position.
The Vectra Security Review service will be tailored to meet the requirements of your organisation. Components of this service can include external and internal network scans, host level server reviews, physical security assessment, network architecture reviews, policy assessment, router and firewall configuration reviews and corporate password strength assessments. Vectra uses a combination of standards, guidelines and best practice to measure the security strength of your organisation.
When protecting the confidentiality, integrity and availability of your organisational information it is important to realise that a potential attack can come from inside your network as well as from outside. Vectra Corporation can assist you to protect against potential attacks that originate internally via an Internal Security Assessment.
As more organisations connect to the Internet, the need to protect networks and systems from unscrupulous persons increases. Vectra Corporation can assist you to assess your organisational vulnerability to these threats and allow you to take mitigating actions to reduce your overall risk. Vectra's solution is an External Security Assessment.
As a part of your Security Review Vectra will focus on the ongoing knowledge transfer to your internal staff to allow for a transfer of skills. In order to ensure this occurs Vectra provides technical details for any potential vulnerabilities identified and a risk rating is applied to allow you to assess the importance of each issue. Complimenting each potential vulnerability is also a recommendation of how you can mitigate the risk presented by the exposure.
Security Device Configuration Review
Security devices are the first line of defence between your organisation's information and the outside world. Security devices include firewalls, routers, intrusion detection/prevention appliances and proxies. They form an integral part of the defence-in-depth model by performing a range of functions, such as network segregation, proxying and access control. Therefore it is critical to your environment to ensure that your organisational security device(s) are sufficiently strong. For example, a firewall that lets inappropriate traffic in to or out from your organisation's network is as effective as buying deadlocks and then leaving the door open.
Vectra can assist you to make certain that your security device(s) are effectively playing their part in the protection of your organisational information by performing a Security Device Configuration Review. During this Review each device is assessed against the business function it provides to your organisation.
A Security Device Configuration Review is undertaken by an experienced Consultant from Vectra's Information Security Team. Our team has a wide range of experience in this area and hold a number of relevant certifications including Cisco (CCNA, CCSP), WatchGuard Certified System Professional, CISM, CISA, and CISSP. A Vectra Security Device Configuration Review will use a range of techniques to assess the device configuration file(s). As an outcome from this Vectra will deliver to you a detailed technical report highlighting each of the exposures identified and providing recommendations. A risk rating will be applied to each exposure as is relevant to your business. This allows for you to tailor a plan to remedy the presented vulnerabilities and thereby minimise organisational risk.
Business Risk Assessment
Organisations often fail to recognise that information is among their most valuable assets and that their business depends on the availability, confidentiality and integrity of the information they use. A Vectra Business Risk Assessment ensures that your organisation does not neglect these crucial tenants.
Vectra's Business Risk Assessment service assists in identifying and quantifying the risks to the business from the loss, disclosure, corruption or unavailability of its information. Once the risks are identified, measures can be taken to ensure that such risks are effectively minimised.
During a Business Risk Assessment we focus on transfer of knowledge to you. This provides your staff with the ability potentially recognise future business risks, thereby minimising the danger to your systems.
Security Framework Consulting
Business Rules/Security Policies
Data Classifications/Application Architecture
Scope Organisational Structure
Proposed ISMS review/approve
Implementation Controls & Remediation
Certification to ISO27K Implementer
Mobility Device Management
With data and device protection for today's most popular mobile devices, including Apple iPhone, Apple iPad, and Android, Vectra through our security and technology partners provides a complete security solution that embraces mobile device diversity. Mobility Management solutions help enterprises offer their employees mobile device choice and ownership while delivering secure and easy access to corporate applications.
With Companies and employees now using mobile devices to perform and store work, devices such as Smart Phones and Tablets need to be included in your data security plan. 71 percent of organisations in Australia are more reliant on mobile devices today compared to a year ago.
A recent report by Edelman for McAfee finds serious disconnect between Australian businesses and mobile device security stating that 25 percent of employees admit to storing confidential work information on their mobile devices; however less than 20 percent of employees are even aware of their company's mobile security policy.
At Vectra Corporation along with our security skill sets and technology partners, can provide solutions to your Mobile device security.
Network security is absolutely vital to the safety of your business information. The internet continues to grow, and access to it is now both fast and at a lower cost. Millions of businesses are enjoying the benefits of connectivity and instant communication.
With instant access and the exposure it brings, businesses must also consider security.
It is important that your network security systems are able to adapt to the changing sources of threats. Centralising management of security and content policy provides a number of benefits, including:
Consistent security posture and policy enforcement across the enterprise
Real-time accounting and reporting across multiple gateways
Comprehensive history and rollback of configuration and policy changes across the network
Centralised version control of anti-spam, anti-virus, Web filter and network access control updates