encription IT Security and Forensic Services

Similar documents
Client logo placeholder XXX REPORT. Page 1 of 37

VULNERABILITY MANAGEMENT

NETWORK PENETRATION TESTING

INFORMATION SECURITY TESTING

Vulnerability analysis

Using Nessus In Web Application Vulnerability Assessments

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

A Decision Maker s Guide to Securing an IT Infrastructure

Introduction. PCI DSS Overview

Client Security Risk Assessment Questionnaire

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Network Detective. Network Detective Inspector RapidFire Tools, Inc. All rights reserved Ver 3D

PCI-DSS Penetration Testing

PCI DSS Top 10 Reports March 2011

CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY

Overcoming PCI Compliance Challenges

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

An Introduction to Network Vulnerability Testing

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

WHITEPAPER. Nessus Exploit Integration

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Vulnerability Assessment Lab

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

WHITE PAPER. An Introduction to Network- Vulnerability Testing

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Continuous Network Monitoring

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

IPLocks Vulnerability Assessment: A Database Assessment Solution

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

How To Protect Your Data From Being Stolen

8 Steps for Network Security Protection

8 Steps For Network Security Protection

April 11, (Revision 2)

Penetration Testing Workshop

PCI DSS and SSC what are these?

PSN Protective Monitoring. Service Definition

Running head: USING NESSUS AND NMAP TOOLS 1

PCI DSS Reporting WHITEPAPER

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

IT Risk Management: Guide to Software Risk Assessments and Audits

THE TOP 4 CONTROLS.

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Patch Management Integration

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

PCI Compliance. Network Scanning. Getting Started Guide

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

GPG13 Protective Monitoring. Service Definition

Spillemyndigheden s Certification Programme Instructions on Vulnerability Scanning

CRYPTUS DIPLOMA IN IT SECURITY

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Information Security Office

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

Nessus Agents. October 2015

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Securing the Service Desk in the Cloud

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Adobe Systems Incorporated

BMC s Security Strategy for ITSM in the SaaS Environment

MANAGED SECURITY SERVICES (MSS)

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Open Source Security Tool Overview

Tenable Network Security Support Portal. January 12, 2015 (Revision 14)

Security aspects of e-tailing. Chapter 7

INFORMATION SECURITY TRAINING CATALOG (2015)

SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS

G-Cloud Pricing. Atos infrastructure Vulnerability Scanning (Outpost24) SaaS

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

MANAGED SECURITY SERVICES (MSS)

IT Security & Compliance. On Time. On Budget. On Demand.

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

OCCS Procedure. Vulnerability Scanning and Management Procedure Reference Number: Last updated: September 6, 2011

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Technical Proposal. In collaboration with Main Contractor. 24 th April 2012 (VER. 1.0) E-SPIN SDN BHD

Better secure IT equipment and systems

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

PCI DSS Requirements - Security Controls and Processes

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

Cyber Security RFP Template

Transcription:

PRODUCT DETAILS CONTENTS THE PROBLEM 2 THE Solution 2 THE PRODUCT AND SERVICE 3 THE BENEFITS 4 OPTIONS 5

THE PROBLEM External IT security breaches caused by malicious hackers, and others, can occur at any time, but it may be several days before an organisation becomes aware of them, and by then it could be too late. PSN CoCo 2.7 and PCI DSS require monitoring on a regular basis with retrievable output on-demand. THE Solution To address this problem IT Security experts Encription limited have developed a configurable vulnerability assessment security scanner that will: + Regularly (daily/hourly your choice) scan the external IT network for any changes; such changes may signify an attack or indicate security vulnerability + Send a notification immediately of any changes found + Give a detailed resolution where appropriate + Identify software that does not have the latest patch + Provide a weekly/monthly/quarterly on-demand security analysis and trend report EXISTING USERS This vulnerability scanning service is already in use by several Councils. References are available on request.

THE PRODUCT AND SERVICE 1. Encription will give the client secure access to one of its remote security scanners which is loaded with a Debian Linux based operating system. Alternatively Encription can run these scans on behalf of the client on an agreed regular basis. The server is configured with Encription Limited modified vulnerability assessment tools including the Tenable Nessus vulnerability scanner (as recommended by CESG) and other GNU licensed security auditing tools including: Nessus Nmap Ike-Scan Nikto Hping3 xprobe Encription NSN Tools SQLi Scanner XSS Scanner Defacement Detection This will create a powerful, fast, flexible and cost effective security posture monitoring system. 2. T he server has an easy to use web interface requiring no knowledge of the tools in use and will enable network administrators to schedule external vulnerability scans. 3. S can reports are available as HTML output or as PDF in easy to read format and contain fixes and links to further information where appropriate. The system provides vulnerability trend analysis and alerting should a new vulnerability be detected. The system may also be configured to provide a schedule PDF via email report to be sent daily, weekly, monthly to nominated recipients. 4. Results are retrievable on-demand as required by GovConnects/CESG.

BENEFITS Earlier awareness of a potential attack or vulnerability Identification of out of date patches Y our IT department will be able to deal with potential security problems more promptly and effectively L ess time is spent by your IT staff on monitoring and more on being productive G ives consistent and reliable verification to the audit process that regular internal IT security testing is taking place and allows historical results to be retrieved on demand Telephone advice and guidance on the use and interpretation of all results produced. The risk and amount of any potential damage is considerably reduced I t fulfils many IT audit requirements including PSN CoCo 2.7 quarterly scanning, PCI DSS (Payment Card Industry Data Security Standard), and the Data Protection Act NB. The tests are automated, it is still recommended that manual Penetration Testing of the system is performed at least annually.

OPTIONS There are two options for the running of the External Security scanner, supported and un-supported, the choice depends on the amount of in-house IT security expertise the organisation has. (NB. Support requires VPN access to your system) PRODUCT Scanner Hardware Set up and configure scanner software Nessus server Licence Nessus ProfessionalFeed Subscription Encription software/tools Licence Initial training Telephone advice and guidance SUPPORTED UN-SUPPORTED Supplied by Encription Supplied by Encription Not