At The BAG, we have the capability to get a high-level snapshot of your security posture.
It is very important to review the organization as a whole and find obvious security holes at design level. This is not like a pen test; we will not scan or identify any vulnerabilities. The review will be conducted using network diagrams, business applications in-use, and interviewing internal IT team. We will deliver an improvement plan with an actionable roadmap. For example, we may suggest installing an extra firewall in the network, re-configure the proxy server, improve the endpoint security system, reduce the wireless network coverage etc.
The following assets can be within-the scope of a Security Review:
- Internal Network security review, firewalls, Wi-Fi, VPNs, DMZ, endpoint security etc.
- External Network security, it includes externally facing firewalls, VPNs, Web servers etc.
- O365 Security Review.
- IDR/IPS/Firewall rules.
- AV settings and Yara rules.