In Our Third Decade of Serving
The Needs of Central Maryland

Systems | Data | Security | Connectivity

In Our Third Decade of Serving
The Needs of Central Maryland

Network Security Risk Assessments

CES provides a full security assesment report allowing anyone to easily understand the current nature of their network security, evaluate strengths, and bring attention to any vulnerable areas. This can be run as a one-time assessment or as part of a scheduled security assessment service.

The Security Assesment Report will include:

SECURITY RISK REPORT: This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.

SECURITY POLICY ASSESSMENT REPORT: A detailed review of the security policies that are in place on both domain wide and local machine basis.

SHARE PERMISSION REPORT BY COMPUTER: Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.

SHARE PERMISSION REPORT BY USER: Organizes permissions by user, showing all shared computers and files to which they have access.

OUTBOUND SECURITY REPORT: Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.

EXTERNAL VULNERABILITIES FULL DETAIL REPORT: A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.

ANOMALOUS USER LOGIN ACTIVITY: Methodically analyze login history from the security event logs. The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in. This report delivers a security professional focus and pinpoints a manageable set of logins to investigate. The alternative is a time-consuming, manual spot check that often misses the mark and is far less reliable.

Click here to request more information on Security Assessments or to schedule a meeting with our experienced technicians to discuss a Security Assessment evalutation for your organization. You can also call our office at 301-620-1580