Having a list of your assets – system types, applications, hardware, active firmware – is the absolute starting point for security solutions. Because how can you protect something which you do not even know exists?
We will help you to develop a process, set up a system and automate it as much as possible, so that you will have all the relevant information regarding your assets and the state they are in.
Every day you create an enormous amount of information. You update your website, you send out press releases, you tackle problems with others via email. You publish articles and contributions to conferences. You cooperate with various universities, and students write their theses about your work. All of this is great – although not if you are inadvertently helping out someone who you do not wish to.
After all, when was the last time you looked at Dropbox to see what is being shared about you and your organization?
It’s irrelevant how secure your infrastructure is or that there are protocols implemented for physical security or even that there is a detailed procedure for the management of incidents if your entire client database is downloadable with a single query to an insecure application.
Knowing your strengths and weaknesses is important. However, discovering your weaknesses is one of the most difficult tasks. And that’s precisely why we’re here – searching for weak spots is what we love to do and we do it well.
We will help you to find weaknesses in your applications, infrastructure, and various processes and will then document it and propose countermeasures.
Every day there is immense amount of information coming your way. Customers are calling; you need to condense materials for a meeting; the insurance company sent a form to fill out; and on top of that, IT is calling for the second day in a row about updating the system. Any one of the above things could be a targeted attack, yet you wouldn’t recognize it in the day-to-day rush. Really though, do you know how to differentiate between a PDF with malware and an order from a customer?
We will put together a “red team” – simulating real attackers – with the goal of improving your defense capabilities. The red team can be put together for one-time or for on-going use (we recommend the latter). The fundamental principal of the red teams is that it is not limited by scope or procedures. It goes without saying that we won’t kidnap your employees or threaten work-flow. A major advantage of on-going cooperation with the red team is that we will continuously hone our knowledge and approach; this know-how will be passed on to the blue team.The more the red team is able to perform better than an actual attacker, the more effectively the blue team will then be at protecting itself.
We will verify whether the threat you received or detected is credible or not. Just because there is a threat, doesn’t automatically mean that you have to get rid of it or invest into minimalizing it.
Unlike threat assessments, threat modeling is a process of identifying all potential threats, such as structural issues, scenarios, vulnerabilities, accessible exploits, attackers, and effects.
We have been with you every step of the way: from the implementing of security solutions to the designing of control systems to the implementing of security for existing systems. We have worked during operations, designed data centers and networks, and have implemented application security. All of this work has provided us with a unique perspective on problematic areas. And thanks to this knowledge of your systems, we are able to assist you in devising security architecture, from the defining of objectives to the implementing of a plan to conceiving a budget and work distribution.
For the resolution of security incidents, we will provide a team, instruments, and know-how. Just because you do not have a security operation center in place nor a group of operators and analysists, does not mean that you cannot properly respond to a security incident.