Technology Services

VULNERABILITY ASSESSMENT

Security threats evolve. From general threats that hamper your organization, to specific risks such as a disgruntled or aggrieved employee or targeted hacking attempts. Spire Solutions will help you minimize your vulnerabilities by conducting regular, periodic audits and assessments. The deliverables from the assessments will provide a clear appraisal of your organization’s ability to withstand any known form of attack.

A Truly Professional Service

Experienced Information security professionals using the very latest technologies and proven, systematic methodologies carry out the assessments. We’ll find the most serious vulnerabilities and where they are located (whether internal or external to your network). We’ll discover any unauthorized hosts and whether employees are attaching unauthorized devices. We’ll determine whether your corporate network could be hacked or accessed via access to your website – or whether security breaches would be possible via your wireless networks.

The Key to a Richer, More Secure Corporate Infrastructure

Once the resilience of your corporate network, portable systems and removable devices has been professionally assessed, you will be in a better position to achieve the levels of compliance required. What’s more, a vulnerability assessment should form an essential part of your overall risk management strategy. At Spire Solutions we have the necessary tools and technologies to ensure your network’s weak points are thoroughly and completely identified so the appropriate remedial action can be taken as soon as possible.

PENETRATION TESTING

How could the latest super-virus corrupt your network? How would it get there? Maybe from the diligent work of a hacker or ex-employee. Perhaps from something that’s viewed as totally harmless such as a USB memory stick or simply via your corporate website or local Wi-Fi network.

But today, we’re not just talking about generic viruses. How can you be sure that you’re not going to be the target of a concerted attack that could suspend your organization’s business? We’re not trying to scare you — with your best interests at heart, we just want remind you that the very real possibility exists.

Comprehensive Solutions, Latest Technologies

Spire Solutions offers the latest techniques and technologies to survey the penetration possibilities of your corporate network. It’s a comprehensive assessment and testing regime that covers wireless network testing, social engineering with user-based testing and physical pen testing. We will work with you to design the most rigorous pen testing scenarios, carry them out and then issue you with detailed, accurate reports for you (and, of course, us, if you wish) to act upon. We can help you with physical security and compliance gap analysis, security planning strategy, application design and architecture reviews and blackbox and whitebox application assessments.

We’ll Show You the Way

Our endgame is to provide you with a remediation roadmap that you can start to implement almost immediately so every part of your network – intranet, extranet, corporate network – is compliant, tested and secure. Think: if one of your IT staff can bypass a ‘secure’ gateway to your network, chances are, so can anyone else. Discover where your network can be penetrated before someone else does.

Other Popular Technology Services

WEB APPLICATION SECURITY AUDIT

Preliminary Investigation

Crawl Stage

Analyze

Attack Phase

Assessment Reporting

FIND OUR MORE
NETWORK MALWARE AUDIT

Information Gathering

Techniques

Assessment Reporting

FIND OUR MORE
RISK MANAGEMENT

Risk Governance

Risk Strategy

Risk Assessment

Gap Analysis

Control Activities

Information & Communication

Monitoring & Reporting

Assessment Reporting

FIND OUR MORE
NETWORK ARCHITECTURE REVIEW

Understanding Network Architecture and WAN Setup

Identification of Network Segments

Datacenter Visit and Identification of Key Controls /Devices

Identification of Internal and External Interfaces

Verification of VLAN Segregation

Analyze Threats & Check Redundancy

Verification of Physical and Logical Access to Devices in Datacenter

Analyze Data Transmission Security

Perform a Review of Selected Firewall Configurations and Firewall Access Rules

Assessment Reporting

FIND OUR MORE
SECURITY CONFIGURATIONS REVIEW

Configuration Review of Critical Network Devices

Review of Firewall Rules-base and Rules

Review of Intrusion Detection Prevention Systems Rules

Identifying Gaps in Configuration Setting for the Network Devices

Checking the Configuration Builds Against Leading Industry Best Practices and Standards

Assessment Reporting

FIND OUR MORE

For more information about our services, please