IT Security Solutions
According to a recent research survey, cyber attacks have increased by almost 80 percent over the last two years! Information Technology (IT) Security should be an ongoing and fundamental consideration in every aspect of your network infrastructure. Proper network configurations can go unnoticed to the untrained eye, which can result in multiple unknown "security vulnerabilities" or breaches in security. Professional security implementation requires a rigorous in-depth analysis with an overall solutions oriented strategy.
FCSI believes that affordable and effective network security solutions are possible to achieve through a highly skilled technology team. Initially, a specialized network security consultant will sit down with you to analyze your situation and create an outline for a strategic security solution. Our network security consultant will then present options and recommendations based upon your needs. Ultimately, our goal is to deliver to you the best value-based and cost-effective Network Security Consulting solutions possible.
Typical security services include:
- Security Audit - identification of current security concerns
- Security Threat Assessment (Penetration testing) - including internal and external vulnerability scans
- Secure Infrastructure Design - secured network design and access strategies including firewalls, intrusion detection, and VPN implementations
Server Security Audit
A Security Audit offers your organization the opportunity to examine your systems for compliance to a variety of security standards. These standards can include internal and external security policies, software manufacturers' recommendations, legal requirements and known "best practices". Our Security Specialist will identify areas where your systems are out of compliance, and provide you with a written estimate of investment necessary to achieve conformance.
Security Auditing will identify the following potential problems:
- Check service pack levels
- Missing security patches
- Check for security alerts/vulnerabilities
- Detect unnecessary shares
- Detect unnecessary open ports
- Detect new security holes using scan comparisons
- Check for unused user accounts
- Check password policy and strength
- Detect potential Trojans on servers and workstations
- Determine if the OS is disclosing too much information
Threat Assessment
A network must be designed with the goal of reducing or eliminating the risk of a security breach. A Security Threat Assessment will allow you to understand where your organization may be vulnerable to a security breach. Using specialized vulnerability management software tools and a series of interviews, our security consultants can help you identify critical areas of vulnerability. These assessments will be performed both internally and externally.
Threat Assessment Process:
- Identify and assess your most critical infrastructures and processes
- Intrusion detection and analysis via data mining and port scanning
- Recommend methods to detect future cyber attacks
- Recommend data integrity and protection
- Prepare Assessment Report
- Prepare written estimate for parts and labor to implement a security "upgrade"
Secure Design
The topology structure of your network is the backbone. While many networks are "flat" without subnetworks and multiple routers, a skilled specialist can diagram a new network structure that can greatly enhance your security level. For example, an office can be on a separate firewall than the warehouse, and a wireless network, exchange server or web server should be on a separate network with separate routing or DHCP. Comprehensive network design and access strategies include firewalls, intrusion detection systems and VPN networks.
Firewall Implementation
A reliable firewall is a critical aspect of any security initiative. We maintain partnerships with the industry's premier firewall manufacturers, including SonicWall, Check Point, and Cisco. Our consultants will assist you in selecting and implementing the firewall that makes the most sense for your organization. Basically, a firewall examines each network packet to determine whether or not to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users.
There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. The most effective firewall implementation is Stateful Packet Inspection. For mobile users, firewalls allow remote access into the private network by the use of secure logon procedures and authentication certificates (VPN).
Network Monitoring
Keeping up with hackers is a full-time job, and one that most organizations do not have the time to do. We proactively monitor hacker activity as they attempt to penetrate your network boundary and receive notifications of a security breach. You'll receive real-time intrusion detection monitoring, as well as log file analysis and comprehensive Internet usage and traffic reports.
Our security management software proactively ensures system availability by establishing security configuration baselines, continuously auditing for security vulnerabilities and helping to correct exposures before they result in security breaches or costly downtime.
Our group of monitoring programs will:
- Check systems for Spy-Ware software.
- Review security policies and ensure that they are current, implemented and enforced.
- Ensure current service-level and security patches have been installed, including antivirus updates.
- Review and monitor critical system logs for suspect activity.
- Revisit your firewall configurations and rules to ensure that unnecessary ports and services are turned off and that access control is tightly managed.
- Revisit access control lists to ensure that access to critical functions and resources is limited.
FCSI's team of professionals can provide your company the extra edge with streamlined processes, dependable delivery and subject matter experts to meet your services needs including: solution architecture, business analysis, project management and more. Engagements can be limited to project discovery and scope, or expanded as requested, up to full implementation with documentation and training.
Contact FCSI today for more information about how FCSI can support and implement your IT challenges while increasing efficiency and decreasing costs.
FCSI IT Security experts will work with you to customize a solution which best meet your needs and preferences.