MANAGED SERVICES PENETRATION TESTING & FORENSIC AUDIT: OVERVIEW PENETRATION TESTING & FORENSIC AUDITS Information security breaches are costly, not only financially, but also affect company reputations, customer loyalties, attract negative press, and could trigger significant fines and penalties. It is impossible to safeguard all information, all the time and although organizations have traditionally sought to prevent breaches using security barriers, such as access controls, cryptography, IPS, IDS and firewalls, it is still impossible for these barriers to safeguard al l information. New vulnerabilities are discovered daily, and attacks constantly evolve in sophistication and automation. Penetration testing identifies and prioritizes security risks, enabling information security professionals to prioritize remediation efforts and, as a result, organizations can proactively anticipate and prevent unauthorized access to valuable information assets . SOLUTION FEATURES On-Site Security Assessment Resolution/clarification of identified or perceived threats Application vulnerability testing Audit Firewall/Packet filter rule sets In-depth Audit report SOLUTION BENEFITS Intelligently manage vulnerabilities Avoid the cost of network downtime Meet regulatory requirements and avoid fines Preserve corporate image and customer loyalty Justify security investments HOW IT WORKS? What is a Penetration Test? Penetration tests are a great way to identify vulnerabilities that exi sts in a system or network that has existing security measures in place. A penetration test usually involves the use of attacking methods conducted by trusted individuals that are similarly used by hostile intruders or hackers. Depending on the type of test that is conducted, this may involve a simple scan of an IP addresses to identify machines that are offering services with known vulnerabilities or even exploiting known vulnerabilities that exists in an unpatched operating system. The results of these te sts or attacks are then documented and presented as report to the owner of the system and the vulnerabilities identified can then be resolved. Bear in mind that a penetration test does not last forever. Depending on the organization conducting the tests, the time frame to conduct each test varies. A penetration test is basically an attempt to breach the security of a network or system and is not a full security audit. This means that it is no more than a view of a system’s security at a single moment in tim e. At this time, the known vulnerabilities, weaknesses or mis-configured systems have not changed within the time frame the penetration test is conducted. Page 1 of 3 Confidential and subject to IS terms and conditions MANAGED SERVICES PENETRATION TESTING & FORENSIC AUDIT: OVERVIEW Penetration testing is often done for two reasons. This is either to increase upper management awareness of security issues or to test intrusion detection and response capabilities. It also helps in assisting the higher management in decision -making processes. The management of an organization might not want to address all the vulnerabilities that are fo und in a vulnerability assessment but might want to address its system weaknesses that are found through a penetration test. This can happen as addressing all the weaknesses that are found in a vulnerability assessment can be costly and most organizations might not be able allocate the budget to do this. What is a Cyber forensic Audit? Cyber forensics can be defined as the process of extracting information and data from computer storage media and guaranteeing its accuracy and reliability. The challenge of course is actually finding this data, collecting it, preserving it, and presenting it in a manner acceptable in a court of law. Electronic evidence is fragile and can easily be modified. Additionally, cyber thieves, criminals, dishonest and even honest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media using a variety of freeware, shareware and commercially available utility programs. A global dependency on technology combined with the expanding presence of the Internet as a key and strategic resource requires that corporate assets are well protected and safeguarded. When those assets come under attack, or are misused, info -security professionals must be able to gather electronic evidence of such misuse and utilize that e vidence to bring to justice those who misuse the technology. PRODUCT OFFERING Perform Cyber forensic audits on compromised/suspect machines and present reports on the results Customers who have been compromised (hacked) would like to audit their environment to establish how have they been hacked, how deep into the network the hackers got and what information if any has been stolen. Customers would also like a Cyber forensic audit to be conducted so as to preserve certain evidence which would be needed, for use in a Cyber Crime/ White collar crime case. Blind external penetration tests on environment to identify loop holes and give a report on recommendations This is to test the security posture of the environment/company, having the least amount of information possible the penetration tester will try to get as deep into the network as possible documenting loop holes for a full comprehensive report being submitted at the end of the review. On-Site security assessment Analyses the security of the clients network, considering the potential for both internal and external attacks. Page 2 of 3 Confidential and subject to IS terms and conditions MANAGED SERVICES PENETRATION TESTING & FORENSIC AUDIT: OVERVIEW Audit customers Firewall/Packet filter rule sets for the applicable networks/systems. Customers would like to audit their firewall/packet filter rules to be sure their rules are defined specifically for their environment and they don’t have general default rules which could cripple their security posture. Remote access and remote worker security We can assess issues such as laptop security, home and tele-worker security, VPN security and access to remote servers. Resolution/clarification of identified or perceived threats against clients infrastructure We can verify claims sent to our customers claiming they have security loop holes. Perform application vulnerability testing on various custom designed solutions and applications/web applications Ensures customers applications/web applications are secure enough to cope with the transactions they are required to undertake. Page 3 of 3 Confidential and subject to IS terms and conditions