Security Assessment Services
Get a Fresh Perspective on your Security Profile
The Value of a Security Assessment
Network and data security is a paramount concern for modern data centers. Cerium security assessments take the mystery out of understanding the current state of your security infrastructure and provide actionable recommendations for defending your network against cyber threats and protecting your critical assets.
Cerium security assessments probe for vulnerabilities contained in network protocols, network services and applications. They establish a baseline for existing security measures, identify gaps, and provide a strategic, risk-based road-map for moving forward. Cerium security assessments improve the level of your real-world security practices and ensure your organization is in compliance with regulatory requirements.
External Vulnerability Analysis (Penetration Testing)
An external vulnerability analysis, a.k.a. penetration testing or pen testing is the controlled attempt to access a computer system or network from “outside” to detect vulnerabilities. It employs the same or similar techniques to those used in a genuine attack. If vulnerabilities are discovered, appropriate measures can then be taken to eliminate the vulnerabilities before they can be exploited. Our pen testing process includes:
- Discovery: enumeration, fingerprinting and banner grabbing
- Scanning: performing port scans and resource identification methods utilizing a variety of open source, customized and commercial tools
- Vulnerability tracking: identifying vulnerabilities in scanned systems and resources
- Manual analysis: to reduce false positives and ensure results match your environment, a security consultant will review and analyze all findings
- Documentation and presentation of results
Whether remotely attacking your Internet-connected firewalls and web servers or conducting on-site attacks that probe the inside of your network, Cerium security consultants function as ethical hackers utilizing the same tools and methods that the bad guys use. With one big difference; our testing is performed from an auditor’s perspective. So, we detect existing security weaknesses, provide you with a comprehensive risk matrix of the vulnerabilities identified, and recommendations for mitigating the risks.
At Cerium, we understand HIPAA compliance. Our security consultants measure your healthcare organization’s current state of security against the HIPAA standard as defined by the National Institute of Standards and Technology. We develop a gap analysis that clearly identifies areas of strength and weakness and then we provide detailed recommendations that enable you to take proactive steps to achieve full compliance.