Assessment
Services | Security Training
| Security System Integration
|
HIPAA Services | Executive
Services
Assessment
Services
Assessments are an important part of understanding how well
prepared your organization is to deal with threats. There
are several types of assessments including security posture
assessments, vulnerability assessments, penetration tests,
resource classification, and policy design and reviews. PSI
offers two assessment packages designed to get your organization
up to speed quickly and improve overall security. PSI can
also customize any assessment to fit the needs of your organization.
Security
Posture Assessment Package I
This package includes 1 day on-site, a network vulnerability
assessment of up to 100 addresses, a preliminary security
posture assessment and resource classification, a final report,
and a 1-day web review of results and recommendations.
Security
Posture Assessment Package II
This package includes 5 days on-site, a network vulnerability
assessment of up to 256 addresses, a security posture assessment
and resource classification, a final report, and a 1-day on-site
review of results and recommendations.
Security
Audit
PSI will determine your compliance with security policies,
standards and guidelines appropriate to your industry or organizational
specific requirements. This custom audit includes a resource
classification to positively identify the mission critical
computers and data in your enterprise. It also includes a
review of communications and network architecture to determine
weaknesses. PSI will recommend controls and protective measures
to mitigate identified weaknesses.
Vulnerability
Assessment
Technology research firm Gartner estimated recently that through
2005, 90 percent of computer attacks will use known security
flaws for which a solution is available. A vulnerability assessment
is an internal or external scan of systems to identify hundreds
of known vulnerabilities that can be easily corrected. PSI
will scan your systems and help you fix known vulnerabilities.
This service is offered as a subscription to keep your systems
up-to-date and protected.
Penetration
Test
Penetration testing is another level of assessing the security
of your systems. Beyond a simple scan, a penetration test
is a multi-step process using zero knowledge, partial knowledge,
and full knowledge techniques to break into your systems the
same way a hacker or insider would. These steps include mapping
network elements to business function, exploiting vulnerabilities
to measure effectiveness, and social engineering to test security
procedures. A "pen-test" helps measure the human side of security
and is a more effective measure of real risk.
Data
Forensics / Incident Response
Sometimes you need to call in experts after youšve experienced
an attack or you think you may have experienced a loss due
to computer crime. PSI can help you gather and protect evidence
for prosecution, perform damage assessment to determine what
was compromised, identify perpetrators, and determine exactly
what happened so that it wonšt happen again.
Certification
and Accreditation
If your industry is subject to government regulation such
as health care, banking and finance, or a civil agency then
your systems may require certification and accreditation against
a myriad of shifting criteria. PSI can help you determine
the applicable regulations, review your systems against the
criteria, and make corrective suggestions to pass accreditation.
Requirements
Analysis / Product Selection / Integration
The best way to select the best security product is to use
your own environment-specific requirements as your guide.
Requirements analysis and product selection go hand-in-hand.
PSI will help you understand your requirements and match product
capabilities to find the best choice for you in firewalls,
authentication, and intrusion detection. PSI can then help
you integrate and deploy your products.
|