M5 Computer Security
Security Assessments

  Home

  Solutions

  Products
    Service Packages
    External Scanning Plus+
    Internal Scanning Plus+
    Security Assessment
    Third Party Services

  Testimonials

  How To Buy

  Contact Us


  Free Scans & Tools

  White Papers

  Security Glossary

  Security Report

  Global WHOIS


Complete Security Assessment


"...officials found that 96% of the successful attacks could have been prevented if users had followed protocols."

Source: Government Computer News, 28 April 2001, http://www.gcn.com/vol1_no1/daily-updates/4028-1.html



Designed to be performed Quarterly or Semi-Annually to:
  • Determine if current information security related policies are followed.

  • Identify areas where current IT and Security related processes are missing or can be improved

  • Create a prioritized list of tasks to improve processes

  • Provide meaningful standard metrics so improvements can be measured over time.

Our Security Assessment is performed by auditing over 100 practices, procedures, configurations and other criteria. We deterimine the way your business handles it's information. Then we make specific security driven recommendations for improving your processes.

  • Vulnerability Awareness
  • Intrusion Detection
  • Patching Procedures
  • Backups
  • Testing Environment
  • Documentation
  • Redundancy
  • Physical Security
  • Inventory
  • Passwords
  • Remote Access
  • Logging
  • Monitoring
  • Security Policy
  • Virus Protection
  • Routing, Packet Filtering
  • Staff Security Knowledge
  • Legal Issues
  • Web Presence / Information Leakage
  • Penetration
  • Firewalls


Depending on the size and complexity of your business, this audit may require between 20 and 100 hours of Security Engineer time. Very big bang for the Buck !


 
Copyright © 2001 - M5 Computer Security
Privacy Policy
This page last modified: December 17, 2014. 10:48:20