Technology has transformed the way we do business. Modern organizations enjoy huge opportunities for improving productivity and reaping the benefits of data sharing with customers, suppliers and business partners. Information and communications systems have become open, flexible, responsive and global; however, without proper process and technology management, these benefits include many security risks.

These risks can be significantly reduced by deploying security countermeasures on several layers of your IT stack. However, such countermeasures introduce additional complexity, are themselves
sometimes vulnerable to attacks, and are managed by fallible administrators.

NIL can help you to determine the presence and quality of security countermeasures in
your infrastructure and applications, and/or their compliance with your security policy, by using a controlled and thorough Technical Security Assessment process.

The result of the NIL Secure – Technical Security Assessment (NIL Secure – TSA) engagement is a rich report containing actionable recommendations that will enable you to further reduce risk to your information assets in a prioritized fashion.

 

 NIL Secure – TSA is offered in the following areas
Assessment AreaDescription
  • Enterprise
    network infrastructure
Assessment of security countermeasures protecting the network infrastructure (device hardening/vulnerabilities, secure routing and switching, control plane security, management plane security, etc.) and network security services (anti-spoofing, 802.1X, NAC, etc.).
  • Operating
    systems and hypervisors
Assessment of security countermeasures protecting operating systems and hypervisors.
  • Wireless
    LAN networks
Assessment of security countermeasures protecting a centralized or distributed IEEE 802.11 wireless network  infrastructure and its services (user authentication, access authorization, cryptographic traffic protection, etc.).
  • Firewall,
    IPS and similar network security systems
Assessment of system hardening and policy enforcement (rule set audit, feature audit, etc.).
  • Virtual
    private networks (VPNs)
Assessment of enterprise or service provider VPN infrastructure protection (VPN device hardening, secure routing, etc.) and traffic policy enforcement (VPN policy audit, cryptographic traffic protection, MPLS VPN separation quality, etc.).
  • Service
    provider (SP) network infrastructure
Assessment of security countermeasures protecting the network infrastructure (device hardening/vulnerabilities, secure routing and switching, control plane security, management plane security, etc.) and network security services (anti-spoofing, NetFlow, edge rate-limiting, etc.).
  • SP
    services
Assessment of security countermeasures protecting SP services (DNS, RADIUS/TACACS+, NetFlow collectors, NMS/OSS, etc.).
  • Enterprise
    and Internet applications
Assessment of security countermeasures built into custom and off-the-shelf enterprise and Internet (typically web-based or SOAP) applications.
  • Unified
    communications (voice/video/presence/…) systems
Assessment of security countermeasures built into enterprise or SP unified communications and VoIP systems.
  • Cloud
    computing
Assessment of security countermeasures present inside cloud-based services.