ECHO certified security team conducts a cyber security assessment that will address the following issues for your business:
- Are your company’s systems already compromised?
- How vulnerable is your company to future cyber security threats?
- What should your company do to get to a desired level of cyber security protection?
ECHO’s certified Security Consultant, Security Engineer, and Project Manager will assess I.T. systems, current security policies and understand business requirements that drive cyber security for the company. The team will perform an internal and external network vulnerability scan. For increased network visibility and analysis, an Intrusion Detection System will collect data during the assessment period. Finally, our team will compile and analyze large amounts of data and provide clients with two documents:
- Master Vulnerability Table – a full report on all potential cyber security risks
- Security Assessment Report – a high level overview of findings and a set of recommendations to bring the company to its desired level of cyber security protection
What is included in ECHO Security Assessment?
- Information Technology Risk Assessment
- Security Policy and Controls Review
- Technology Infrastructure Review
- Architectural Vulnerability Review
- Firewall Configuration/Code Review
- Business DR/BCP Review
- External Vulnerability Assessment
- External Scanning
- External Information Reconnaissance
- External Network and Host Discovery
- External Vulnerability Scanning
- Internal Assessment
- Internal Network and Host Discovery
- Internal Vulnerability Scanning
- Wireless Assessment
- Wireless Testing
- External Access Point Probing
- Passive Sniffing
- Active Probing
- Encryption Evaluation
- Rogue Access Point Detection
- Intrusion Detection Traffic Assessment
- Intrusion Detection Systems network insertion
- Traffic Capture and Analysis