Network Security, Assesment and Audits

  • Assess your risk and protect your company data from exposure, tampering and theft
  • Meet HIPPA and Sarbanes Oxley compliance regulations
  • Keep hackers from disrupting your network


Information Security Consulting Services

ICS offers world-class information security consulting services. We apply cutting-edge methodologies to resolve your most critical information security challenges. Our offerings incorporate industry standards, including Gramm, Leech, Biley, ISO 17799, and the latest HIPAA guidelines. We offer practical solutions to real world problems, customized to address the particular circumstances faced by you and your organization.

How To Secure Computer Networks

First determine what level of security you need. Then a risk assessment should be completed, the more comprehensive the better. Follow the corrective actions reported by the risk assessment. Perform penetration testing to evaluate the organizations security defenses. Repeat periodically and when business processes or technology changes.

Risk Assessments – Identify gaps and risks in computer network security
 
  • FRAAP – 3 to 5 days, $3,995 and up*
  •  
  • MSA – less than a day, $395*
  •  
  • QSR – 1 hour, $120*
  •  
  • MBSA - 1 hour, FREE*

  • Server Hardening – Configure servers to Microsoft best practices and more
     
  • File Server – $*
  •  
  • Application Server – $*
  •  
  • Web/IIS Server – $*
  • What is a FRAAP?
    A FRAAP is a Facilitated Risk Analysis and Assessment Process. It is a qualitative risk analysis and assessment process performed by our security experts. It will identify potential undesirable and/or unauthorized events (risks) that can negatively impact the integrity, confidentiality, or availability of information contained in the system. It provides you with a cost effective, non technical, enterprise wide information security risk analysis. FRAAP is a wide reaching offering that allows you to perform risk assessment and analysis on any critical area of your business.

      Deliverables:
       
  • Threats will be identified
  •    
  • Probability that a threat will occur
  •    
  • Impact if the threat does occur
  •    
  • Risk levels established
  •    
  • Mitigating controls and safeguards identified
  •    
  • Implementation action plan
  • What is an MSA?
    A Microsoft Security Assessment is a process designed to help you gain a better understanding of your security gaps and risks. It is not a replacement for an audit/analysis by our certified security professionals.
      Deliverables:
       
  • Threats will be identified
  •    
  • Risk levels reported
  •    
  • Mitigating safeguards identified
  •    
  • Prioritized Action List

  • What is a QSR?
    A Quick Security Review will recommend basic security measures to help safeguard a computer network. It is not a replacement for an audit/analysis by our certified security professionals.
      Deliverables:
       
  • Some Basic Threats will be identified
  •    
  • Mitigating safeguards identified
    What is an MBSA?
    A Microsoft Baseline Security Analysis is a process that we use to identify some security threats to your Windows network. It will determine the security state in accordance with Microsoft security recommendations and offers specific remediations and detect common security misconfigurations and missing security updates on your Windows computer systems. It is not comprehensive and not a replacement for a full audit/analysis by our certified security professionals.
      Deliverables:
       
  • Some Threats will be identified
  •    
  • Risk levels reported
  •    
  • Recommendations for correction
    What kind of Risk Assesment do I need?
    If your organization:

     
  • Requires formal documentation and policies
  •  
  • Must adhere to legal requirements, Sarbanes Oxley, HIPPA, ISO 17799 etc.
  •  
  • Has a fiduciary duty to stockholders
  •  
  • Keeps customer credit card or financial data
  •  
  • Has proprietary information, secret recipes, R&D
  • Then consider a FRAAP to assess the risks.

    If your organization:

     
  • Wants to have a better understanding of their security gaps and risks
  • Then consider a MSA to assess the risks.

    If your organization:

     
  • Does not meet the above requirements, does not require a security policy
        and has computers
  • Then consider a QSR or MBSA to assess the risks.

    *Prices dependant on size of organization and number of computers

    Wireless Security Assessment (WSA)
    Our WSA uses cutting edge technology to assess the security of your wireless network and the components in it. This provides you with a thorough evaluation of your entire wireless network, including wireless access points, encryption schemes, wireless clients, and back-end systems. We will provide your organization with a written report on the health of your wireless security, a network map outlining your current network configuration and a written policy on how to secure your wireless network.

    Network Vulnerability Assessment (NVA)
    The ICS NVA utilizes a top-down, bottom-up approach. The top-down component focuses upon the security culture of the corporate environment and the business drivers. In this stage, policies and procedures are evaluated and developed or refined where necessary. In the bottom-up component, the focus is on the technical side, evaluating the network and security systems to ensure the maximum protection of corporate assets.

    Penetration Testing
    A penetration test is a method of evaluating your organizations network and information security by subjecting it to real world attack scenarios. This analysis is carried out by our information security professional and involves active exploitation of security vulnerabilities. Results are presented to the organization in a comprehensive penetration test report. We offer internal /external network, WIFI and web penetration testing. Think your data is secure? Is that new website hackable? Let an independent third party test your security.

    *Prices dependant on size of organization and number of computers

     


     


    Want Tech
    Support Now?


    CALL US
    480-664-4141

     
       
     


    How to choose
    the right
    computer service

     
     



    "The ICS team has reduced our costs significantly while increasing our
    level of service"
    Greg Gipson, CEO
    Gipson Manufacturing

     
     
     
     
    Exchange
    SQL
    Small Business
    Sharepoint
    Web
    CRM
    BizTalk
    Hyper-V
    Forefront
    Speech
    System Center
     
     

     

    Total Care Will:
    Save money and time spent on computer network management. Reduce computer downtime and increase data security.

     

     

     

    Designed & hosted by ICS Contact webmaster
    Copyright © 2001 - 2009 ICS. All rights reserved.