It may sound obvious, but it is very often over looked. A sound and sensible security strategy begins by understanding the threats faced and the risk levels associated to those threats.
ICE Systems offer a range of one off, ongoing or fully managed vulnerability assessments which provide the business with a simple to understand overview of the posture of network resources. This can be complimented by more in-depth network and application penetration testing, providing more a thorough understanding of the current security perspective as a whole.
However traditional vulnerability and penetration testing is only part of the process.
In recent years there has been a significant rise in the proliferation of applications that are by their nature purpose built to by pass good security practices. These applications include but are not limited to Instant Messaging (IM), Peer 2 Peer (P2P) & Skype. Whilst these applications were developed with the home user market in mind, many employees have, either with or without their knowledge, embraced these applications leading to “invisible “ traffic on the corporate network.
ICE Systems offer businesses unique visibility into these types of application usage on the corporate network; strategies which can be deployed to ensure that the benefits gained by the use of them are not over shadowed by the threats they can present.
All of the assessments culminate in comprehensive reports from which security strategies can be based and significant business benefits derived.