SecurityConfiguration_baner-min.png

SECURE CONFIGURATION AUDIT

Identify Insecure Configurations and Harden your System Against Targeted Attacks

Speak to a Security Expert

Defense In-depth Approach

A Secure Configuration Audit protects vulnerabilities against sophisticated, targeted long term attacks where hackers gain access to privileged systems and data. Even a zero day attack has less of a chance resulting in a security breach in a securely configured system. Leading technology advisory firm Gartner, considers configuration hardening an essential defense against targeted attacks.

FULL_VISIBILITY.png

Full Visibility

Performing a secure configuration review provides visibility on:

UserAccess_controlSystems-min.png

User access control on systems

PasswordAccountpolicies-min.png

Password and account policies

applicationsRunning_on_criticalSystems-min.png

Services and applications running on critical systems

missing_securit-patches-min.png

The current set of missing security patches

VISIBILITY_Banner-min.png
Secure configuration

Complete System Configuration

A secure configuration audit checks every facet of your network for the vulnerabilities hackers exploit to gain access. This includes operating systems, your network, and databases.

Network_Security-DeviceN-min-194x300.png

OS

  • File System Security
  • Account Policies
  • Access Control
  • Network Settings
  • System Authentication
  • Logging and Auditing
  • Patches and Updates
NetworkSecurityDevice-min-414x223.png

Network/Security Device

  • File System Security
  • Account Policies
  • Access Control
  • Network Settings
  • System Authentication
  • Logging and Auditing
  • Patches and Updates
SecurityConfiguration_Line.png

Database

  • Account Authentication
  • Password Policy
  • Account Privileges
  • Auditing
  • Logging and Tracing
  • Network Access Mechanism
  • Patching
  • Files and Directories Permission
SecurityConfiguration_RightLine.png

Provide a Strong Foundation for your Security Defenses

Speak to a Security Expert
SecurityConfiguration_4.png

The Secure Configuration
Audit Process

Our comprehensive audit process gives you a comprehensive view of your security posture

Configuraton-Setting-min-1.png
Configuraton-Setting-mob.png

Configuraton Setting Collection

The audit process begins with script execution as well as a manual collection of your current configuration settings.

SettingAnalysis-min-1.png
SettingAnalysis-min-mob.png

Configuration Setting Analysis

We then continue by conducting a comparison of the script output or the manually collected settings against established Paladion baseline settings.

REPORTS-min-1.png
REPORTSUBMISSION-min-mob.png

Draft Report Submission

After the audit is complete we provide a safe/unsafe status check with detailed descriptions of unsafe findings and discuss those findings with administrators to better understand the client’s environment.

final_report-min-1.png
final_report-mob.png

Final Report

At the conclusion of the secure configuration audit, our team of experts provides a final report with detailed findings, a risk rating, and suggestions for mitigating risk.

total_support-min-1.png
total_support-mob.png

Total Support

We have support for close to 50 common platforms that include operation systems, web servers, network devices, and firewalls. In addition, our databases and configuration audit checklists and policies comply with CIS and NIST standards.

Provide a Strong Foundation for your Security Defenses

Speak to an ISO 27001 Consultant
Busting-Myths-and-Building-Trust-Screenshot-min.jpg

Secure your network from the latest threats

Network Penetration Testing

Read More

Download this Webpage

ISO-27001-Certification-Screenshot.png